bugcrowd
@Bugcrowd
Followers
191K
Following
19K
Media
9K
Statuses
26K
The leading provider of crowdsourced cybersecurity solutions purpose-built to secure the digitally connected world...Unleash Ingenuity™
San Francisco, CA
Joined September 2012
Broken access control is giving major security ick. 🫠 If a user can access something they shouldn’t, that’s a red flag, beige flag, AND green flag… for attackers. This is one of the many insights from our 2025 Inside the Mind of a CISO report, powered by direct feedback from
0
1
11
Financial services teams are navigating some of the most complex security challenges on the planet, which makes next week’s Black Hat Europe conversations even more important 🔑 👉 Ethical Hackers Strengthen Financial Services Security at Scale 🎙️ Nicholas McKenzie (Bugcrowd) 🎙️
0
0
3
We’re giving away two FREE passes to @AWS Student Community Day on December 13 in Vadodara, India 🎉🇮🇳 If you’re a student hungry to build, ship, break, and learn in the cloud, this is for you. SCD is a full day of hands-on workshops, real-world demos, and inspiration from
2
0
15
Ready to hack APIs? We'll show you how. APIs are the backbone of modern applications, and they're a goldmine for bugs. In this episode, we'll demystify API hacking by walking you through a practical methodology for finding critical vulnerabilities. You'll learn: 📙 The
1
4
43
A critical RCE vulnerability (CVE-2025-55182) in React Server Components was disclosed on December 3. Early signs show meaningful exposure across monitored environments. Bugcrowd has activated its zero-day workflow, formed a dedicated triage group, and is validating submissions.
4
9
65
Understanding these roles is key to building resilient systems. Learn more here!👇 https://t.co/ugpE7FzH6U
bugcrowd.com
The adoption of AI systems such as LLMs promises revolutionary competitive advantages, just as technologies like mobile apps, cloud computing, and IoT did in the past. However, as with any new...
0
1
3
3️⃣ AI as a Threat Beyond external attacks, AI models can cause insidious, internal harm: We've already seen instances where LLM applications reflect bias, hateful speech, or misinformation present in their training data. Unintended behavior from AI systems can lead to
1
0
2
2️⃣AI as a Target AI systems themselves are becoming valuable targets for exploitation: AI models often have access to sensitive data and other critical internal services. Threat actors will look to exploit vulnerabilities within these AI systems (via the AI vector) to gain
1
0
1
1️⃣ AI as a Tool Both defenders and attackers will use AI to achieve scale: - For Attackers: Threat actors use AI (like content generation bots) to create more convincing and personalized spear phishing attacks quickly. - For Defenders: Security teams train AI models to detect
1
0
1
In the bug bounty and hacking world, AI plays three significant roles: as a Tool, a Target, and a Threat. Let's break down why understanding all three is critical. 👇
1
0
10