• Community
    • Join Discord
    • Industry News
    • Discussions
    • Contact & Support
  • Learn
    • Featured Courses
    • All Courses
    • Categories
      • Cybersecurity Fundamentals
      • Networking Security
      • Application Security
      • Ethical Hacking
      • Cloud Security
  • Resources
    • Blog
    • Ebooks
    • Podcasts
    • Webinars
  • Pricing
  • About Cybr
    Sign in Sign up

    Cybr logo badge

    Cybr logo badge

    • Community
      • Join Discord
      • Industry News
      • Discussions
      • Contact & Support
    • Learn
      • Featured Courses
      • All Courses
      • Categories
        • Cybersecurity Fundamentals
        • Networking Security
        • Application Security
        • Ethical Hacking
        • Cloud Security
    • Resources
      • Blog
      • Ebooks
      • Podcasts
      • Webinars
    • Pricing
    • About Cybr
    Sign in Sign up

    Tag: Bug Bounty

    Hakluke cover image for bug bounty article

    How a pentester struggled with bug bounties until this new mindset helped him breakthrough

    "It was a long, arduous, journey to finding my first bug." Then one day, Hakluke attended a talk by @shubs that changed his mindset about how to appro…
    Christophe January 19, 2022
    1 Comment
    Person working on computer

    What you need before submitting a bug bounty report

    I’m writing this because I’ve been seeing people struggle to understand when they’re ready to submit a bug report. Maybe they find something interesting as…

    Christophe October 22, 2021
    0 Comments
    XSS image alt tag banner

    Stored XSS vulnerability in image alt attribute to steal cookies (Bug Bounty)

    I recently found a stored XSS vulnerability through an image alt attribute. While I can’t share any details about where, I can share details about…

    Christophe May 13, 2021
    5 Comments
    State of web application security and common flaws

    The 8 Most Common Web Application Security Flaws

    Would you believe me if I told you that a vast majority of web applications currently in production contain known vulnerabilities? By known vulnerabilities, I…

    Christophe May 25, 2020
    2 Comments

    Get notified of new posts

    Recent Posts

    • Network segmentation
    • Jump servers (aka bastion hosts)
    • Bluesnarfing and Bluejacking
    • Biometrics techniques and concepts for authentication
    • Key stretching concepts and algorithms

    Categories

    • Announcements
    • Application Security
    • Beginner
    • Career
    • Certifications
    • Cloud Security
    • Community
    • Cybersecurity
    • Cybersecurity Fundamentals
    • Ethical Hacking
    • Incident Response
    • Intermediate
    • Network Security
    • Programming Languages
    • Scripting

    Recent Comments

    • lifengquan52 on SQL Injections explained
    • Christophe on Performance-based Questions #1
    • pep on Performance-based Questions #1
    • lifengquan52 on Creating a home lab environment
    • Christophe on Performance-based Questions #1
    Cybr logo badge
    © 2023 - Cybr, Inc
    • Contact
    • Courses
    • Discord
    • Terms of Service
    • Privacy Policy

    Report

    There was a problem reporting this post.

    Harassment or bullying behavior
    Contains mature or sensitive content
    Contains misleading or false information
    Contains abusive or derogatory content
    Contains spam, fake content or potential malware

    Block Member?

    Please confirm you want to block this member.

    You will no longer be able to:

    • See blocked member's posts
    • Mention this member in posts

    Please allow a few minutes for this process to complete.

    Report

    You have already reported this .