
Strengthening decentralized security: Bugcrowd’s VRT 1.15 update
By Paddy Cassidy, February 12, 2025

The EU Cyber Resilience Act (CRA), explained
By Gareth O Sullivan, February 11, 2025

MFA security part 2: How to prevent MFA bypass
By Alistair G, Director of Red Team Operations, February 11, 2025

The Unlikely Romance Between Hackers and CISOs
By Nick McKenzie | Bugcrowd CISO, February 10, 2025
Subscribe for updates
Get Started with Bugcrowd
Hackers aren’t waiting, so why should you? See how Bugcrowd can quickly improve your security posture.