BugBase Profile Banner
BugBase Profile
BugBase

@BugBase

Followers
2K
Following
648
Media
456
Statuses
751

AI for security and Bug Bounties!

Joined May 2021
Don't wanna be here? Send us removal request.
@BugBase
BugBase
3 days
Visit to know more:
0
0
0
@BugBase
BugBase
3 days
🚨 New Campaign Alert 🚨. We’ve teamed up with Groww!. - Aug 20 – Sept 10, 2025.- 1.5x bounties on all valid reports.Focus: Auth flaws, data leaks, SQLi, SSRF, infra misconfigs, supply chain risks & more. 👉 Hack, report, earn more. Secure Groww!. #Groww #BugBase
Tweet media one
1
0
1
@grok
Grok
2 days
Join millions who have switched to Grok.
35
66
409
@BugBase
BugBase
5 months
Join us for Live hacking event with @_groww . What’s in it for you?.- Bounty rewards up to $7,500 per eligible bug (severity‑based).- Special prizes for the Most Valuable Hacker & the Top 3 performers.- When: April 25/26, 2025.- Where: Bangalore .- RSVP:
Tweet media one
1
1
11
@BugBase
BugBase
5 months
RT @dhruvagoyal: Pentest Copilot by @BugBase demonstrates lateral movement in network using an SSH key found on a compromised host. The vi….
0
4
0
@BugBase
BugBase
6 months
Special campaign alert: Groww’s Bug Bounty now offers 1.5x rewards for vulnerabilities risking PII exposure & security control bypass. Join here: #Groww #BugBounty #CyberSecurity #Infosec. @_groww
Tweet media one
1
4
10
@BugBase
BugBase
8 months
Wishing everyone a very Happy New Year 2025! 🎉. We ended 2024 with our first live hacking event in collaboration with @ClearfromCT and @Nullblr. In 2025, we’re aiming even higher with larger events, bigger collaborations, and more opportunities for researchers.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
0
10
@BugBase
BugBase
9 months
RT @Nullblr: Exciting update! 🎉. We @Nullblr are proud to collaborate with @BugBase for their Live Hacking Event in partnership with ClearT….
0
3
0
@BugBase
BugBase
9 months
💥 Groww just launched a Bug Bounty program on BugBase with rewards of up to $3,000! 🚀 Are you ready to hunt vulnerabilities & secure the future of finance? 💰🔍. 👉 Start now: #BugBounty #CyberSecurity #Groww #BugBase #EarnRewards
Tweet media one
Tweet media two
0
4
32
@BugBase
BugBase
1 year
Missed the Webinar on "Comprehensive Analysis of JWT Vulnerabilities" by Pragya Gupta, Security Engineer at PhonePe? . Watch the Full Recording Now: #BugBase #Webinar #BugGyaan #JWTs #Cybersecurity.
0
1
2
@BugBase
BugBase
1 year
Deep Learning Specialization by Andrew Ng: Neural Networks by 3Blue1Brown: A gentle introduction to Machine Learning by StatQuest with Josh Starmer: #Cybersecurity #AI #MachineLearning #LearningResources.
0
1
2
@BugBase
BugBase
1 year
These topics act as a good starting point for anyone willing to get a basic intuitive understanding of AI. For further learning, check out these resources:.
1
0
2
@BugBase
BugBase
1 year
🧠 Deep Learning Basics:. - Neural Networks: Explore the basics of neural networks, the building blocks of deep learning. - Convolutional Neural Networks (CNNs): Discover how CNNs are used for image recognition and general classification.
1
0
0
@BugBase
BugBase
1 year
🕸️ Advanced Machine Learning Techniques:. - Decision Trees: Understand how decision trees can be used for classification and regression tasks. - Graphs: Explore the use of graph-based models in machine learning.
1
0
0
@BugBase
BugBase
1 year
🔍 Fundamentals of Machine Learning:. - Linear Regression: Understand the fundamentals of predicting outcomes using linear relationships. - Logistic Regression: Learn how to predict categorical outcomes, crucial for binary classifications. - Support Vector Machines (SVM).
1
0
0
@BugBase
BugBase
1 year
🤔 Have you ever felt lost with all the jargon and words being thrown around about AI?. As cybersecurity enthusiasts, many of you might have felt some FOMO or fear about this. So, here's your guide to developing a basic understanding of AI:.
1
0
3
@BugBase
BugBase
1 year
E) Monitor and Analyze: Continuously monitor user activity and network traffic for suspicious behavior. Here are some good places to start:. 1. 🔗 2. 🔗 #ZeroTrust #CyberSecurity #CloudSecurity #NetworkSecurity #DataProtection
Tweet media one
0
0
1
@BugBase
BugBase
1 year
C) Enforce Least Privilege Access:.Limit user access to only what is necessary for their role and function. D) Micro-Segment Your Network: Divide your network into smaller segments to contain potential breaches.
1
0
1
@BugBase
BugBase
1 year
🛠️ Steps to Implement Zero Trust Security in Your Company:. A) Identify Your Critical Assets:.Determine which data, applications, and services are most critical to protect. B) Verify User Identity:.Implement multi-factor authentication to ensure users are who they claim to be.
1
0
0
@BugBase
BugBase
1 year
Why use the Zero Trust Model? 45% of breaches involved cloud-based services, hence the need for robust security in distributed environments.
1
0
0
@BugBase
BugBase
1 year
📊 A report by Cisco, based on a survey of 4,700 global information security professionals, found that 86.5% have started implementing some aspect of the zero-trust security model, but only 2% have mature deployments in place.
1
0
0