Remove beg-bounties
article thumbnail

S3 Ep27: Census scammers, beg bounties and data breach fines [Podcast]

Naked Security

New episode - listen now!

article thumbnail

Weekly Update 269

Troy Hunt

Beg bounties are a terrible practice that should die a fiery death (although I'm a little tempted to mess with them a little more. 🙂) Sponsored by: 1Password is a secure password manager and digital wallet that keeps you safe online.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Certificate Transparency Does More Harm Than Good – Here’s Why

Security Boulevard

In this blog post, I’ll explore both how Certificate Transparency is helpful and the downsides, including the way it shares users' information and the rise of beg bounties. With Google’s recent decision to change the lock icon, I’ve been spending a lot of time thinking about TLS/SSL - and certificate transparency in general.

52
article thumbnail

Beg Bounties

Troy Hunt

But not this time: That link Mayank shared leads to a page that literally has this at the bottom of it (conveniently cropped off the earlier image he attached): This is why my email above says "beg bounty" and it's exactly what it sounds like - someone begging for a bounty. Maybe he forgot?

Scams 69
article thumbnail

What to do when a bug bounty request sounds more like extortion

SC Magazine

In a ransomware panel session at last week’s Incident Response Forum, experts weighed in on what to do when unscrupulous, independent gray hat researchers contact a company after identifying a vulnerability and demand a large bug bounty, threatening to otherwise publish their findings or sell it. beg bounty.”.

CSO 101
article thumbnail

Security Researchers Ask U.S. Supreme Court to Protect Them

SecureWorld News

Now, a group of security researchers are begging the Supreme Court to change that. Voluntary Disclosure Guidelines and Industry-Sponsored Bug Bounty Programs Are Not Sufficient to Mitigate the Chill. What are security researchers asking the Supreme Court? On the surface, the CFAA sounds like a victory for cybersecurity.

article thumbnail

What Can Happen When You Fail to Secure a Continuous Integration (CI) API

Security Boulevard

Nevertheless, the cloud vendors involved promptly rotated their keys, double checked the findings, and even offered bounty rewards to the finders of the issue. This begs the question, what problems can result from exposed logs within APIs? Travis CI made a statement saying the vulnerability exposing thousands of secrets was “by design.”

Media 52