The Bug Bounty Hunter and The New Zero-Day Exploit Economy

History

Bugs, also referred to as vulnerabilities in software, are flaws that can be abused to cause unintended behaviors in the system or software that result in the disclosure of sensitive information, negatively impact availability, or provide unauthorized access. These bugs are what malicious hackers use to create exploits around thIn this article I demystify…

--

--

--

Hacker | Cybersecurity Content Creator | Influencer | Published Author

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Parker & Lane: Twisted Minds Hack Free Resources Generator

Difference between EIGRP and OSPF

Web3 Security 🔒 (Part 1 — Attack Vectors, Code Security & Audit)

ClaimSwap & VEVE Partnership

IoT Village: The Face of IoT Security Worldwide

Everything you Wanted to know about privacy, but were afraid to ask $SCRT

Top 5 New Open Source Security Vulnerabilities in August 2018

Is Tether Gold Really Gold-Backed?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Alissa Knight

Alissa Knight

Hacker | Cybersecurity Content Creator | Influencer | Published Author

More from Medium

Hackthebox — Paper Walkthrough

What really is Cybersecurity?

The Parler Hack

How The Web Works from TryHackme[Day -2]