BugBase Profile Banner
BugBase Profile
BugBase

@BugBase

Followers
2K
Following
647
Media
456
Statuses
751

AI for security and Bug Bounties!

Joined May 2021
Don't wanna be here? Send us removal request.
@BugBase
BugBase
4 months
Visit to know more:
0
1
0
@BugBase
BugBase
4 months
๐Ÿšจ New Campaign Alert ๐Ÿšจ Weโ€™ve teamed up with Groww! - Aug 20 โ€“ Sept 10, 2025 - 1.5x bounties on all valid reports Focus: Auth flaws, data leaks, SQLi, SSRF, infra misconfigs, supply chain risks & more. ๐Ÿ‘‰ Hack, report, earn more. Secure Groww! #Groww #BugBase
1
1
1
@BugBase
BugBase
9 months
Join us for Live hacking event with @_groww Whatโ€™s in it for you? - Bounty rewards up to $7,500 per eligible bug (severityโ€‘based) - Special prizes for the Most Valuable Hacker & the Top 3 performers - When: April 25/26, 2025 - Where: Bangalore - RSVP: https://t.co/WKnWrkkvrO
1
2
11
@dhruvagoyal
Dhruva Goyal
9 months
Pentest Copilot by @BugBase demonstrates lateral movement in network using an SSH key found on a compromised host. The video shows the complete attack flow from the compromised host to running the agent(RAT) on the remote host with a clear, step-by-step exploit graph.
0
4
9
@BugBase
BugBase
10 months
Special campaign alert: Growwโ€™s Bug Bounty now offers 1.5x rewards for vulnerabilities risking PII exposure & security control bypass. Join here: https://t.co/EUq96118Cx #Groww #BugBounty #CyberSecurity #Infosec @_groww
1
5
11
@BugBase
BugBase
11 months
Wishing everyone a very Happy New Year 2025! ๐ŸŽ‰ We ended 2024 with our first live hacking event in collaboration with @ClearfromCT and @Nullblr. In 2025, weโ€™re aiming even higher with larger events, bigger collaborations, and more opportunities for researchers.
0
1
10
@Nullblr
Null Bangalore
1 year
Exciting update! ๐ŸŽ‰ We @Nullblr are proud to collaborate with @BugBase for their Live Hacking Event in partnership with ClearTax. ๐Ÿ’ฐ Bounties: Up to $1,000 per eligible bug (based on severity). RSVP by: 20th November. Join us and make an impact!
0
4
16
@BugBase
BugBase
1 year
๐Ÿ’ฅ Groww just launched a Bug Bounty program on BugBase with rewards of up to $3,000! ๐Ÿš€ Are you ready to hunt vulnerabilities & secure the future of finance? ๐Ÿ’ฐ๐Ÿ” ๐Ÿ‘‰ Start now: https://t.co/EUq96118Cx #BugBounty #CyberSecurity #Groww #BugBase #EarnRewards
0
5
32
@BugBase
BugBase
1 year
Missed the Webinar on "Comprehensive Analysis of JWT Vulnerabilities" by Pragya Gupta, Security Engineer at PhonePe? Watch the Full Recording Now: https://t.co/mmW3jhYxJG #BugBase #Webinar #BugGyaan #JWTs #Cybersecurity
0
2
1
@BugBase
BugBase
2 years
Deep Learning Specialization by Andrew Ng: https://t.co/4vDz6ya0Fm Neural Networks by 3Blue1Brown: https://t.co/XO7CxKyedD A gentle introduction to Machine Learning by StatQuest with Josh Starmer: https://t.co/WXjNia9La0 #Cybersecurity #AI #MachineLearning #LearningResources
0
0
1
@BugBase
BugBase
2 years
These topics act as a good starting point for anyone willing to get a basic intuitive understanding of AI. For further learning, check out these resources:
1
0
1
@BugBase
BugBase
2 years
๐Ÿง  Deep Learning Basics: - Neural Networks: Explore the basics of neural networks, the building blocks of deep learning. - Convolutional Neural Networks (CNNs): Discover how CNNs are used for image recognition and general classification.
1
0
0
@BugBase
BugBase
2 years
๐Ÿ•ธ๏ธ Advanced Machine Learning Techniques: - Decision Trees: Understand how decision trees can be used for classification and regression tasks. - Graphs: Explore the use of graph-based models in machine learning.
1
0
0
@BugBase
BugBase
2 years
๐Ÿ” Fundamentals of Machine Learning: - Linear Regression: Understand the fundamentals of predicting outcomes using linear relationships. - Logistic Regression: Learn how to predict categorical outcomes, crucial for binary classifications. - Support Vector Machines (SVM)
1
0
0
@BugBase
BugBase
2 years
๐Ÿค” Have you ever felt lost with all the jargon and words being thrown around about AI? As cybersecurity enthusiasts, many of you might have felt some FOMO or fear about this. So, here's your guide to developing a basic understanding of AI:
1
0
2
@BugBase
BugBase
2 years
E) Monitor and Analyze: Continuously monitor user activity and network traffic for suspicious behavior. Here are some good places to start: 1. ๐Ÿ”— https://t.co/TqDTBCWI0C 2. ๐Ÿ”— https://t.co/YJoAAu8d5Q #ZeroTrust #CyberSecurity #CloudSecurity #NetworkSecurity #DataProtection
0
0
0
@BugBase
BugBase
2 years
C) Enforce Least Privilege Access: Limit user access to only what is necessary for their role and function. D) Micro-Segment Your Network: Divide your network into smaller segments to contain potential breaches.
1
0
0
@BugBase
BugBase
2 years
๐Ÿ› ๏ธ Steps to Implement Zero Trust Security in Your Company: A) Identify Your Critical Assets: Determine which data, applications, and services are most critical to protect. B) Verify User Identity: Implement multi-factor authentication to ensure users are who they claim to be
1
0
0
@BugBase
BugBase
2 years
Why use the Zero Trust Model? 45% of breaches involved cloud-based services, hence the need for robust security in distributed environments.
1
0
0
@BugBase
BugBase
2 years
๐Ÿ“Š A report by Cisco, based on a survey of 4,700 global information security professionals, found that 86.5% have started implementing some aspect of the zero-trust security model, but only 2% have mature deployments in place.
1
0
0