Friday, August 9, 2019
Posted by Editorial_Staff_Team
Reader's rate:
5
Apple Updates Bug Bounty Program Q4 In recent years, Apple and the company around cupertino have received massive criticism about the current Bug Bounty program. Among other things, well-known security researchers from the scene have criticized Apple for a faulty program, which attracts others but... + continue reading
Thursday, March 7, 2019
Posted by Editorial_Staff_Team
Reader's rate:
5
Telekom Magenta Musik 360 - CERT Coordinates The videos shows the reproduce for the german telekom in a new service they did publish in 2019 Q1. The vulnerabilities are persistent and non-persistent cross site scripting issues within the front / backend of the online service. Remote attackers... + continue reading
Friday, February 15, 2019
Posted by Editorial_Staff_Team
Reader's rate:
5
Internation Bug Bounty Program to PenTest E-Voting System The federal government of switzerland offers hackers who can uncover vulnerabilities, privacy issues or simple bugs in its e-voting system up to 44,000 euros. International White Hat or ethics hackers are given the opportunity to... + continue reading
Monday, December 24, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
Yes, we did it again! Due to the last few years we have discovered several problems that bypass the password protection mechanism of ios. In recent weeks we have discovered a new problem affecting the latest ios versions 12.1 and 12.1.1.1. The vulnerability allows password protection to be... + continue reading
Friday, November 16, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
Open Redirect in Microsoft BingPlaces Business uncovered Security researchers of the vulnerability laboratory uncovered this week an open redirect vulnerability in the famous microsoft bingplaces business web-application. The issue allows to redirect users by client-side get method request to... + continue reading
Monday, August 20, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
Google Expands Existing Bug Bounty Program in 2018 Google now wants to reward security researchers who are able to report methods of misuse of googles product series. Google has expanded its bug bounty program to include rewards that go beyond reporting specific vulnerabilities. Security... + continue reading
Tuesday, July 24, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
New Banana PI R1 SD V3 Case Available The Banana Pi R1 is a router based on the same SoC as the M1 Classic Pi. The R1 is an open hardware router that runs on a variety of open source operating systems such as OpenWrt, Android and Bananian. The R1 has a slim router form factor with a bay for 2.5... + continue reading
Monday, July 23, 2018
Posted by Editorial_Staff_Team
Reader's rate:
4.5
Mozilla's New ASan Nightly Build Project Bug Bounty Program 2018 A new solution of the Nightly Build was opened with a bug bounty program from Mozilla Corporation in the last days. With a special variant of the Nightly Builds of the Firefox browser, users can search for memory errors... + continue reading
Thursday, July 19, 2018
Posted by Editorial_Staff_Team
Reader's rate:
4
Vulnerability Affecting Main Lead Database of Adobe Systems Within the last years the vulnerability lab core research team and individuals around the lab infrastructure discovered a lot of zero-day vulnerabilities to the psirt team of adobe system. More and more issues was resolved during the... + continue reading

Featured Cooperative Security Articles

Friday, 09/08/19 - 2 comment(s)
Apple Updates Bug Bounty Program Q4 In recent years, Apple and the company around cupertino have received massive criticism about the current Bug Bounty program. Among other things, well-known security researchers from the scene have criticized Apple for a faulty program, which attracts others but never pays off. The reason for this was that... + continue reading
Thursday, 07/03/19 - 1 comment(s)
Telekom Magenta Musik 360 - CERT Coordinates The videos shows the reproduce for the german telekom in a new service they did publish in 2019 Q1. The vulnerabilities are persistent and non-persistent cross site scripting issues within the front / backend of the online service. Remote attackers are able to inject own malicious script codes to... + continue reading

TOP SECURITY STORIES

Friday, 09/08/19 - 2 comment(s)
Apple Updates Bug Bounty Program Q4 In recent years, Apple and the company around cupertino have received massive criticism about the current Bug Bounty program. Among other things, well-known... + continue reading

BUG BOUNTY ISSUES

Monday, 24/12/18 - 0 comment(s)
Yes, we did it again! Due to the last few years we have discovered several problems that bypass the password protection mechanism of ios. In recent weeks we have discovered a new problem... + continue reading

VULNERABILITIES & BUGS

BEST SECURITY VIDEOS

Thursday, 07/03/19 - 1 comment(s)
Telekom Magenta Musik 360 - CERT Coordinates The videos shows the reproduce for the german telekom in a new service they did publish in 2019 Q1. The vulnerabilities are persistent and non-... + continue reading

LAB MAGAZINE ISSUES

Wednesday, 12/03/14 - 1 comment(s)
Vulnerability Magazine Welcome to the Vulnerability Magazine! The the vulnerability magazine, publishes the latest vulnerabilities and security informations from our laboratory infrastructure.... + continue reading

IT-SECURITY EVENTS

Friday, 24/11/17 - 2 comment(s)
Legendary free speech - You are the Key! In the last weeks we got invited to the very famous JBFone Conference organized by the Fiducia & GAD IT AG. The Fiducia & GAD IT AG is a public... + continue reading
Tue
28
Apr
Editorial_Staff_Team's picture

Egyptian Workshop - Bug Bounty & Security Research

Egyptian Workshop - Security Research & PenetrationTesting

The goal of the event is to spread the idea of information security within Egypt and attract Geeks and people who interested in information security.

We will discuss the following topics ...
1. How to begin your journey in hacking and penetration testing?
2. How to keep your personal information and website secure?
3. How can programmers use their knowledge in hacking to make secured applications?
4. What is Bug Bounty Programs and Who is the best security researchers who has the best influence on this field?

Everyboy of egypt is welcome to register and for sure we also support other african parties next to the event.

Thu
23
Apr
Editorial_Staff_Team's picture

Microsoft starts the new Project Spartan Bug Bounty Program (22 April - 22 June)

Microsoft starts the Project Spartan Bug Bounty Program

Microsoft announced the startup of a new bug bounty program "Project Spartan" on Wednesday (22 April). The security project spartan extends the still active microsoft online service bug bounty programs.

The new codename is in used for the new microsoft browser in windows 10 technical preview and the azure cloud platform. The new bug bounty program covers the following services ...

- Azure Cloud Services

- Azure Virtual Machines

- Azure Active Directory

- Azure Storage

The bug bounty payment range is set between 500$ and 15.000$ to reward a researcher for a valid submission.

Pages

Subscribe to Vulnerability Magazine - Bug Bounties, Acknoweldgements & Security Research RSS