Articles about Bug Bounty

Epic Bounties recognized as the best project of the Keiretsu Investors Forum.

Málaga, Spain, Febrary 2023. Epic Bounties recognition as the best project.

Read more
From Pentesting to Pentesting as a Service (PaaS)

Málaga, Spain, Decemeber 2022. From Pentesting to Pentesting as a Service (PaaS)

Read more
Two bigs of security are joining forces

Málaga, Spain, June 2022. Two bigs of security are joining forces.

Read more
New Bug Bounty program for Ironchip

Málaga, Spain, May 2022. Epic Bounties is the bug bounty platform chosen by Ironchip.

Read more
Trends within bug bounty programs.

Trends within bug bounty programs continue to rise, so it is important to be updated to any changes or modifications around this program.

Read more
Why implement a Bug Bounty programme?

To understand the reasons for implementing this type of cybersecurity program, we would like to go back to 1983, where a reward was first offered for anyone who found or reported a bug in the Versatile Real operating system from Hunter & Ready.

Read more
Top 5 Cloud Security Risks

With the new normality brought about by COVID-19, the services provided by the cloud are on the rise, but we must not forget to be cautious and take into account the variety of security risks we face.

Read more
CVSS (Common Vulnerability Scoring System) - Concepts and Metrics

The Common Vulnerability Scoring System (CVSS) is increasingly indispensable in the security of organizations, where they can prioritize vulnerabilities according to CVSS score risk (low, medium or high).

Read more
Bug Bounty, what is it for companies?

The bug bounty programmes have given a lot to talk about in the different companies that we find today. Some do not give importance to vulnerabilities or errors that their own assets may contain, but what they do not know is that the later they are found and corrected, the worse the problem will be.

Read more
Partnership agreement with A3SEC

Today we are celebrating because… A3SEC has joined Epic Bounties as a partner.

Read more
What we need to know about CISOS

What we should know about CISOS (Chief Information Security Officer) is a question that is increasing with the evolution of technology and is closely related to security. This is due to the increase of vulnerabilities in companies, which forces them to work to improve the security of their assets and minimise risks.

Read more
5 myths you should know about a bug bounty programme

Nowadays, companies need to find possible vulnerabilities that may exist on their server. This is the purpose of a bug bounty programme. To refresh your memory a little more, we show you our article (internal link - main keys in a bug bounty programme).

Read more
Basics of WAPT (Web Application Penetration Testing)

At Epic Bounties we would like to show you the basic concepts to carry out a WAPT, as well as the different phases that you must execute in order to identify, gather and remediate the different vulnerabilities that your company may have.

Read more
José Palanco, CEO at Epic Bounties

José Ramón Palanco, CEO of Epic Bounties, has a clear objective with the platform: to make Epic Bounties the world’s leading Spanish-speaking platform in the hotly contested market of cybersecurity bug bounty programmes.

Read more
Cybersecurity risk management

Companies are facing continuous attacks on the security of their assets on a daily basis. During the first months of 2020, these attacks increased by 33%. Therefore, in this article we are going to talk about cybersecurity risk management.

Read more
Main keys in a bug bounty program

Bug bounty programs are a pay-for-performance approach to proactive security testing designed to maximize the discovery of high-impact vulnerabilities in organizations.

Read more
Vulnerability disclosure program. Why is it so important for CISOS?

What is a vulnerability disclosure program?

Read more
Three common ways in which organizations are hacked

When it comes to security teams, one of the highest priorities is to reduce risk. An important part of risk reduction is the creation of a cybersecurity risk management strategy.

Read more
Why trust hunters

One of the most common questions we encounter in conversations around bug bounty programs is “Why would I invite hunters to hack my assets?”, “Why should I trust hunters?”, or some variant thereof.

Read more
Securing more with less

Before the pandemic situation, companies used to think that the security of their services and systems were safe and secure. Now, as telecommuting has become a possible way for workers to work in companies, each organization has less physical oversight of the devices and tools they use.

Read more
Webinar July 2021

EpicBounties has reached a collaboration agreement with the DragonJAR community, this agreement will allow EpicBounties to offer customers of the platform the entire DragonJAR community that has about 400 thousand members from Spanish-speaking countries.

Read more
5 ways in which CISOs benefit from hunter-driven security

According to most cyber security managers, cyber security should always be measurable and focused on results. The return on investment is not always a direct financial return, but it should be monitored for each action or tool used to track the evolution of assets or products.

Read more