hacxx
Uzman Üye
This is a list of Bug Bounty programs and where to get more information to make a responsible disclosure and make profit.
Responsible disclosure statement
about.pinterest.com
Security Overview - ActiveProspect
Learn how we have achieved SOC 2 Type II compliance and discover which measures we've taken to ensure the security of your business data.
activeprospect.com
Amara - Caption, translate, subtitle and transcribe video.
The easiest way to caption and translate any video, with crowdsourcing, volunteers, and professional services.
amara.org
Security
If you have a problem with your password, please contact support. If you have a complaint about a site hosted on WordPress.com, please see our complaints page. If your site has been suspended for a…
automattic.com
Vulnerability Reporting - Amazon Web Services (AWS)
Report any vulnerabilities you find here.
aws.amazon.com
Earn CPEs with Bug Bounty
Since 2013, (ISC)² has been a partner of Bugcrowd, running a public bug bounty program and offering CPE credits to our members. Bugcrowd is a leading provider of crowdsourced security and bug bounty programs, connecting organizations with more than 50,000 independent security researchers to...
blog.isc2.org
Web Security Tools
campaigns.websecurify.com
Mamba Bug Bounty Program
Mamba pays a reward for every vulnerability found in our apps which was confirmed by our specialists.
corp.wamba.com
cPanel Security Bounty Program | cPanel
In order to show its appreciation for security researchers who follow responsible disclosure principles, cPanel, Inc. is offering a monetary reward program for researchers who provide assistance with identifying and correcting certain Qualifying Vulnerabilities within the scope of this program...
cpanel.net
Thanks - Altervista
en.altervista.org
EthnoHub | Security
ethnohub.com
Security Overview | Evernote
Our note taking app helps you capture and prioritize ideas, projects and to-do lists, so nothing falls through the cracks. Start your free trial today!
evernote.com
Security - Harmony Website Management
get.harmonyapp.com
Pocket Help
help.getpocket.com
The Internet Bug Bounty | HackerOne
internetbugbounty.org
Security — JRuby.org
jruby.org
Acknowledgements / Credits - KeePass
keepass.info
Keming Labs Security Disclosure
keminglabs.com
Datensicherheit und -schutz bei Mailchimp | Mailchimp
Informationen zur Datensicherheit und zum Datenschutz bei Mailchimp
mailchimp.com
Stellantis Media - FCA US Launches Bug Bounty Program to Advance Vehicle Cybersecurity
Reflecting the rapidly increasing convergence of connectivity technology and the automotive industry, FCA US LLC today announced the launch of a public bug bounty program on the Bugcrowd platform to enhance the safety and security of its consumers, their vehicles and connected services.
media.fcanorthamerica.com
Observu Security
observu.com
Security Acknowledgements | OpenText
OpenText reviews all reports of security vulnerabilities affecting OpenText products and services.
opentext.com
eBay Security Center
pages.ebay.com
perlsec - Perl security - Perldoc Browser
perldoc.perl.org
Content Unavailable
scn.sap.com
Responsible Disclosure Policy | Sprout Social
Learn more about the responsible disclosure policy SproutSocial.com, a social media management tool for business.
sproutsocial.com
Responsible Disclosure Policy - Beanstalk Help
Keeping customer data safe and secure is our top priority. If you've discovered a security vulnerability, please do not share it publicly. Instead, report it to
support.beanstalkapp.com
How to report a bug to Iconfinder? | Iconfinder Knowledgebase
support.iconfinder.com
Webconverger has better out of the box security
webconverger.org
WeiFund - Decentralized Fundraising
weifund.io
IBM PSIRT | IBM Trust Center
Learn how IBM's Security Vulnerability Management program comprehensively addresses security vulnerabilities in IBM products, offerings, and websites.
www-03.ibm.com
Security Acknowledgements
Security Acknowledgements We encourage people who find security issues on our platform to immediately report them to our Customer Care Team.
www.123contactform.com
Data Protection and Security | ActiveCampaign
ActiveCampaign is heavily focused on GDPR and HIPAA compliance. Learn more about our approach to data protection and security.
www.activecampaign.com
Niet gevonden | Adapcare: ECD voor de care
www.adapcare.nl
Alcyon :: Responsible Disclosure
www.alcyon.nl
Report a Potential Security Vulnerability
www.avast.com
Cisco Security Vulnerability Policy
www.cisco.com
Debian bug tracking system
www.debian.org
Report A Bug - DNN Open Source Platform | DNN (DotNetNuke)
Report a bug about the latest version of DNN (formerly DotNetNuke) open source CMS and online community software.
www.dnnsoftware.com
Eclipse Vulnerability Reporting | The Eclipse Foundation
The Eclipse Foundation provides our global community of individuals and organisations with a mature, scalable, and business-friendly environment for open source …
www.eclipse.org
Cost of Living Comparisons, 2024 data.
Cost of Living comparisons for thousands of cities. Fully up-to-date cost of living comparisons, including prices of 52 products and services.
www.expatistan.com
Fluxiom - Simplify Your Digital Asset Management Experience
Reporting a security issue to Fluxiom Fluxiom engineers continuously monitor our network for indications of security vulnerabilities that may put customer data at risk. Should ...
www.fluxiom.com
Glitch: The friendly community where everyone builds the web
Simple, powerful, free tools to create and use millions of apps.
www.fogcreek.com
Security Reporting | Freelancer
Tell Freelancer about security vulnerabilities in their website and be recognised for your contributions.
www.freelancer.com
GIMP - Bugs
If you think you found a bug, it is very important to report it. If the developers don’t know about what might be broken, they can’t fix it. So there you are at your computer trying to do something with GIMP and it freaks out at you. It …
www.gimp.org
Google and Alphabet Vulnerability Reward Program (VRP) Rules | Google Bug Hunters
Services in scope Qualifying vulnerabilities Non-qualifying vulnerabilities Reward amounts for security vulnerabilities Report Quality Rewards are adjusted based on the quality of the report. The main factors considered are: Demonstrated security...
www.google.com
Google and Alphabet Vulnerability Reward Program (VRP) Rules | Google Bug Hunters
Services in scope Qualifying vulnerabilities Non-qualifying vulnerabilities Reward amounts for security vulnerabilities Report Quality Rewards are adjusted based on the quality of the report. The main factors considered are: Demonstrated security...
www.google.com
Hex-Rays Security Bug Bounty Program
www.hex-rays.com
Reporting Suspected Vulnerabilities
www.huawei.com
Responsible Disclosure Policy | Infoplus Commerce
Infoplus Warehouse Management System Legal - Responsible Disclosure Policy
www.infopluscommerce.com
IntegraXor HMI/SCADA Bug Bounty Program - Ecava IGX Web SCADA
IntegraXor HMI/SCADA Bug Bounty Program This Non-Monetary Bug Bounty Program is part of our effort to make IntegraXor SCADA more secure, safe & stable. Below are the rules for joining. Terms & conditions apply. Considerations We only concern on the issue that will impact our customers’...
www.integraxor.com
Maddysoft
www.maddysoft.com
Marktplaats - Help & Info
www.marktplaats.nl
How to report a bug - MediaWiki
www.mediawiki.org
Trust
www.meraki.com
Data Management Solutions for the Cloud | NetApp
Modernize your data management systems and simplify cloud data storage with NetApp – the world’s leader in data management solutions.
www.netapp.com
OpenBSD: Security
www.openbsd.org
PayChoice | Online Payment Solutions | Payments Australia
Streamline your payment processing with PayChoice, the online payment solution for over 3000 Australian businesses.
www.paychoice.com.au
Responsible Disclosure - Pinoy Hack News - PHN
I am glad to announce that we are embracing a bug bounty program. In the moment, since we are just a small company we can only list you in our Hall of Fame as a token of appreciation- Responsible Disclosure
www.pinoyhacknews.com
Rackspace Technology Security Vulnerability Reporting
www.rackspace.com
Kwetsbaarheid melden
Ontdekt u een zwakke plek of kwetsbaarheid op deze website, meld dit dan aan het Nationaal Cyber Security Centrum (NCSC). Het maken van zo'n melding heet Coordinated Vulnerability Disclosure (CVD).
www.rijksoverheid.nl
Security
www.riotgames.com
Security policy
A language empowering everyone to build reliable and efficient software.
www.rust-lang.org
Skuid security overview
www.skuidify.com
Veilig bankieren
We werken elke dag hard om te zorgen dat je je bankzaken veilig kunt regelen bij SNS.
www.snsbank.nl
Contact Us Your Software Supply Chain Experts
Get in touch with our experts today to help secure your software supply chain. Get product support, become a partner, or connect about media inquiries.
www.sonatype.com
Responsible Disclosure
www.telecomitalia.com
Redirecting...
www.twitch.tv
Secure Contact and Security Disclosures | Zetetic
Public key contact information for Zetetic
zetetic.net
Vulnerability Acknowledgements for Red Hat online services - Red Hat Customer Portal
Vulnerability Acknowledgements for Red Hat online services.
access.redhat.com
Attack Challenge | Aircloak
Mehr Transparenz und Sicherheit: Die Aircloak Attack Challenge ist das weltweit erste Bounty-Programm für eine Anonymisierungsmethode.
aircloak.com
AirVPN contributes to OpenVPN 2.4 audit and bugs bounty
Hello! Were glad to inform you that we are contributing to the OSTIF project for an extensive OpenVPN 2.4 audit and bugs bounty. https://airvpn.org/missionhttps://ostif.org/top-ostif-donors/ Kind regards & dataloveAirVPN Staff
airvpn.org
Bug bounty [Ancient Brain]
ancientbrain.com
Bug Bounty Program - Artifex
Information related to the Ghostscript and MuPDF Bug Bounty Program.
artifex.com
Asana | Bugcrowd
Learn more about Asana’s Bug Bounty engagement powered by Bugcrowd, the leader in crowdsourced security solutions.
asana.com
Auth0 By Okta | Bugcrowd
Learn more about Okta’s Public Bug Bounty engagement powered by Bugcrowd, the leader in crowdsourced security solutions.
auth0.com
Bumble Tech – Medium
We’re the tech team behind social networking apps Bumble and Badoo. Our products help millions of people build meaningful connections around the world.
badoo.com
Security Response
Have you discovered a web security flaw that might impact one of our products? Here’s how you can report it.
basecamp.com
Security | Beamery
At Beamery, we are committed to ensuring privacy and security data at all levels: in our work, across our organization, and in our platform.
beamery.com
Introducing Our Bug Bounty Program - Bitaccess
Today, we’re happy to announce the opening of our bug bounty program to the developer community. Bitaccess has long maintained private bounty programs, allowing security researchers to analyze pre- and […]
bitaccess.ca
Bitbns Bug Bounty Program
Bitbns Invites individuals and companies to test and report errors if found.
bitbns.com
Smart Contracts and Bug Bounty
Update Dec 3, 2019: This article is out of date. See the latest Bug Bounty.
blog.airswap.io
The Bitwarden Blog
Blogs, news, updates, and information of all kinds can be found here at the Bitwarden Blog.
blog.bitwarden.com
Centrify's Bug Bounty Program with Bugcrowd | Centrify
That’s why I am very happy to announce that Centrify has opened a public bug bounty program today with the help of Bugcrowd.
blog.centrify.com
ChronoWallet Bug Bounty
We believe in a Bug Bounty program that fosters collaboration amongst professionals to help us building the most secure and useful wallet…
blog.chronobank.io
Bug Bounty Program for Tendermint & Cosmos
At Tendermint, we believe that security researchers and white hat hackers are a vital part of building strong, resilient cryptocurrency…
blog.cosmos.network
Nectar Token Bug Bounty | rhino.fi
As we approach the launch of Ethfinex and the Nectar token, we are now running an open bug bounty program for the Ethereum community to analyse our token co ...
blog.ethfinex.com
Genesis Vision Bounty Program
We believe in a decentralized economy and cryptocurrency community. The Bounty program is aimed at engaging community in our campaign…
blog.genesis.vision
DutchX and Initial OWL Generation Bug Bounty
We’re excited to announce that we are conducting a bug bounty for all contracts relevant for our upcoming DutchX release as well as the…
blog.gnosis.pm
Indorse Bug Bounty Program
Today, we are publishing a Smart Contract for public review.
blog.indorse.io
Bug Bounty: Current List of Payouts
The IOTA Bug Bounty program was announced now more than a month ago. During this timeframe many of the existing, but also new community members participated in the bug hunting. In total, we have found more than 35 issues (mostly in the low category) which the dev team quickly resolved.
blog.iota.org
Kyber Network Exchange Bug Bounty
Updates: This bug bounty was created for the first mainnet deployment. We are still running on-going bug bounty campaigns for various code…
blog.kyber.network
Announcing the 1 Million LEV Bug Bounty
The Leverj staking contract is running on ropsten and very soon will be running on mainnet.
blog.leverj.io
Meteor allow/deny vulnerability disclosure
A security bug in a common Meteor configuration which requires your attention
blog.meteor.com
Request Network Foundation
Request Network provides Web3 infrastructure for payments, invoices, accounting apps.
blog.request.network
Responsible Disclosure / Special Thanks
At Splitwise, we’re lucky to have supportive users who help us to find bugs and potential security vulnerabilities via responsible disclosure. If you believe you have discovered a potential issue w…
blog.splitwise.com
Springworks Blog
We want to help you learn about the human resources and employee engagement. Get practical advice on remote work, team building, and succeeding at work.
blog.springrole.com
Blog | Higher Logic
Check out Logic's blog for increasing association member engagement, improving your online community and keeping your customers happy. Read articles from our blog now!
blog.vanillaforums.com
Blog
blog.vasco.com
Lif TGE Bug Bounty Program
We’re excited to announce that we are starting our bug bounty ahead of the Líf Token Generation Event. We believe bug bounties are…
blog.windingtree.com
Announcing the Windows Bounty Program – Microsoft Security Response Center
blogs.technet.microsoft.com
Ethereum Bug Bounty Program | ethereum.org
An overview of the Ethereum bug bounty program: how to get involved and reward information.
bounty.ethereum.org
YesWeHack - Global Bug Bounty & Vulnerability Management Platform
YesWeHack is a global Bug Bounty & Vulnerability Management Platform. With a worldwide presence, YesWeHack connects organisations to tens of thousands of bug hunters. The aim is to uncover and patch vulnerabilities in websites, mobile apps, connected devices and digital infrastructure.
bountyfactory.io
A Cryptocurrency Wallet | BRD
BRD is the simple and secure way to get started with Bitcoin, Ethereum and other cryptocurrencies.
brd.com
Zendesk Sell Bug Bounty Program
bugbounty.getbase.com
LINE Security Bug Bounty Program
LY Corporation will host the LINE Security Bug Bounty Program.
bugbounty.linecorp.com
Prezi
Prezi designs and creates presentation software that is enabling millions of people to be great presenters.
bugbounty.prezi.com
Appliances Barracuda Networks, Inc. | Bugcrowd
Learn more about Barracuda Networks’s Public Bug Bounty engagement powered by Bugcrowd, the leader in crowdsourced security solutions.
bugcrowd.com
Cisco Meraki | Bugcrowd
Learn more about Meraki’s Public Bug Bounty engagement powered by Bugcrowd, the leader in crowdsourced security solutions.
bugcrowd.com
Constant Contact, Inc. | Bugcrowd
Learn more about Constant Contact ’s Vulnerability Disclosure engagement powered by Bugcrowd, the leader in crowdsourced security solutions.
bugcrowd.com
eero’s vulnerability disclosure program | Bugcrowd
Learn more about eero’s vulnerability disclosure program powered by Bugcrowd, the leader in crowdsourced security solutions.
bugcrowd.com
Fitbit’s bug bounty program | Bugcrowd
Learn more about Fitbit’s bug bounty program powered by Bugcrowd, the leader in crowdsourced security solutions.
bugcrowd.com
Secure Drop | Bugcrowd
Learn more about Freedom of the Press Foundation’s Public Bug Bounty engagement powered by Bugcrowd, the leader in crowdsourced security solutions.
bugcrowd.com
Humble Bundle | Bugcrowd
Learn more about Humble Bundle’s Public Bug Bounty engagement powered by Bugcrowd, the leader in crowdsourced security solutions.
bugcrowd.com
Indeed | Bugcrowd
Learn more about Indeed’s Public Bug Bounty engagement powered by Bugcrowd, the leader in crowdsourced security solutions.
bugcrowd.com
Intercom | Bugcrowd
Learn more about Intercom’s Public Bug Bounty engagement powered by Bugcrowd, the leader in crowdsourced security solutions.
bugcrowd.com
Beyond, Inc. | Vulnerability Disclosure Program | Bugcrowd
Learn more about Overstock.com’s Vulnerability Disclosure engagement powered by Bugcrowd, the leader in crowdsourced security solutions.
bugcrowd.com
Socrata’s bug bounty program | Bugcrowd
Learn more about Socrata’s bug bounty program powered by Bugcrowd, the leader in crowdsourced security solutions.
bugcrowd.com
Bug Bounty: Statuspage | Bugcrowd
Learn more about Atlassian’s bug bounty program powered by Bugcrowd, the leader in crowdsourced security solutions.
bugcrowd.com
Western Union | Bugcrowd
Learn more about Western Union’s Public Bug Bounty engagement powered by Bugcrowd, the leader in crowdsourced security solutions.
bugcrowd.com
Site moved!
bugs.archlinux.org
PHP :: Report - New
bugs.php.net
GNOME Bugzilla
bugzilla.gnome.org
Cappasity is the platform for production of immersive shopping experiences
Cappasity is a cloud-based platform that lets online stores easily create and deliver 3D, AR and NFT shopping experiences. 3D and 360 Product Photography.
cappasity.com
Semi-Integrated Solutions for Merchants
Our semi-integrated unified commerce solution connects every channel, so merchants can engage their customers while shopping online and in-store.
cayan.com
Secure billing software
PCI compliant, secure billing software to protect you and your customers. Proven reliability to keep your recurring billing running smoothly.
chargify.com
Your security is our priority
From encryption to audit logs and top-tier security certifications, learn what CircleCI is doing to keep your data safe.
circleci.com
ClickUp™ | Security & Bug Reporting Program
Please email us at [email protected] with any vulnerability reports or questions about the program. We'll make it worth your while.
clickup.com
Security
clojars.org
HONOR CLUB (Global)
HONOR CLUB (Global) offers rich and high-quality content around its various products, including smartphones, wearables, laptops and accessories. Also, you are welcome to participate in exciting activities online.
club.hihonor.com
Security
Code Climate is trusted by thousands of organizations to deliver the power of cloud-scale machine learning without risk to your code.
codeclimate.com
- Crypto News - CoinSpectator
Mainstream Cryptocurrency News Cointelegraph NewsBTC Coindesk Bitcoin.com Decrypt Coinspectator Dailycoin
coinspectator.com
Bug Reporting - EVE Community
Eve Online is the world's largest MMO RPG universe rich in adventure, as player corporations compete in a massively multiplayer online space game.
community.eveonline.com
Report A Vulnerability
If you have found a security vulnerability on Teradici products, please let us know.
connect.teradici.com
Security contacts and procedures - Red Hat Customer Portal
Access Red Hat’s knowledge, guidance, and support through your subscription.
coreos.com
Tuenti: la compañía móvil que te ofrece mucho más
Tuenti tiene una oferta inigualable que ninguna otra compañía puede ofrecerte: llamadas, gigas, la mejor cobertura, chat y llamadas sin límites con la app, y mucho más.
corporate.tuenti.com
Responsible Disclosure Policy
If you are a security researcher and have discovered a security vulnerability in one of our services or sites, we encourage you to disclose it to us in a responsible manner.
corporate.walmart.com
Responsible Disclosure
Contact us, if you discover any vulnerabilities on our websites and help us improve the safety and reliability of our systems.
danskebank.com
Deconet Bounty Program
deco.network
Responsible Disclosure
We take security issues seriously & respond swiftly to fix verifiable security issues. Report yours to [email protected]. Keep the internet secure!
detectify.com
Bug Reporting - Apple Developer
Now with Feedback Assistant available on iPhone, iPad, Mac, and the web, it’s easier to submit effective bug reports and request enhancements to APIs and tools.
developer.apple.com
Security Bug Bounty | Discord
As part of our commitment to security, we reward security researchers for reporting security vulnerabilities responsibly to us.
discordapp.com
DNSimple Security - DNSimple
DNSimple helps you safeguard your domains with DDoS Defense combined with other security features like multi-factor authentication and activity logging.
dnsimple.com
How to Submit a Bug Report
How to Submit a Bug Report. Learn how to get started with Nuxeo documentation.
doc.nuxeo.com
Security of PowerDNS — PowerDNS Authoritative Server documentation
doc.powerdns.com
Archive of security issues | Django documentation
The web framework for perfectionists with deadlines.
docs.djangoproject.com
How do you report a bug? - Joomla! Documentation
docs.joomla.org
White Hat Program - TruValidate Multifactor Authentication Documentation
TruValidate Multifactor Authentication documentation
docs.launchkey.com
Responsible Disclosure Policy
Rollbar aims to keep its Services safe for everyone, and data security is of utmost priority. If you are a security researcher and have discovered a security vulnerability in the Services, we appreciate your help in disclosing it to us in a responsible manner. Rollbar will engage with security...
docs.rollbar.com
Drupal Security Team
Goals of the security team Resolve reported security issues in a Security Advisory Provide assistance for contributed module maintainers in resolving security issues Provide documentation on how to write secure code Provide documentation on securing your site Help the infrastructure team to keep...
drupal.org
Duo Security Disclosure & Bug Handling Policy
Learn how Duo Labs handles vulnerability disclosure as well as what security researchers and customers can expect when they disclose a vulnerability to Duo.
duo.com
Report Security Issue
As a worldwide provider of business and financial information, security is one of our top priorities. We process millions of company and director...
en.datocapital.com
Responsible Disclosure - Internetwache - A secure internet is our concern
Responsible Disclosure Security isn’t easy, and we all know it. That’s why we’re running a responsible disclosure program. …
en.internetwache.org
Engineering at Quora
engineering.quora.com
First 100 Days of Yelp's Public Bug Bounty Program
First 100 Days of Yelp's Public Bug Bounty Program Martin Georgiev, Software Engineer Dec 20, 2016 One hundred days ago we launched Yelp’s public bug bounty program on HackerOne. Since...
engineeringblog.yelp.com
Xoxoday Home
enterprise.xoxoday.com
The ESP32 Security Bug Bounty Program (US$500!) - ESP32 Forum
Espressif ESP32 Official Forum
esp32.com
Etherscan Bug Bounty Page
etherscan.io
Report a Security Vulnerability | Event Espresso
eventespresso.com
FireBounty | The Ultimate Vulnerability Disclosure Policy and Bug Bounty List!
FireBounty, aggregate your bounty
firebounty.com
FlexLists - About
Use FlexLists to create sharable lists of tasks, issues, literature and more.
flexlists.com
Security
foursquare.com
Responsible Disclosure Policy - Fuga Cloud
As a hosting provider, we consider the security of our systems and those of our customers highly important. If you have found a weak spot we would like to hear from you.
fuga.cloud
GateHub Wallet
GateHub is a platform for the Internet of Value. Built on XRP Ledger protocol it allows everyone to send, receive, trade and manage any type of assets.
gatehub.net
GCC Bugs - GNU Project
gcc.gnu.org
DPD - Security Disclosures
DPD encourages the responsible disclosure of security vulnerabilities
getdpd.com
GitHub - sass/libsass: A C/C++ implementation of a Sass compiler
A C/C++ implementation of a Sass compiler. Contribute to sass/libsass development by creating an account on GitHub.
github.com
GLX.com - Capital Market Directory & Social Finance Network
GLX.com is a Capital Market Directory and Social Finance Network. The destination is a global capital market news data portal and ground-breaking financial networking platform.
glx.co
Report | Google Bug Hunters
Found a security vulnerability? Discover our forms for reporting security issues to Google: for the standard VRP, Google Play, and Play Data Abuse.
goo.gl
Grok Academy
We want to make Grok Academy a safe and secure learning environment for all. If you've discovered a vulnerability in Grok Academy, we appreciate your help in disclosing it in a responsible manner.
groklearning.com
HackenProof | Web3 Bug Bounty platform for Crypto Projects
HackenProof is a leading bug bounty platform in the web3 space. HackenProof’s primary aim is to offer crowdsourced services such as bug bounty programs, smart contract contests
hackenproof.com
Bime - Bug Bounty Program | HackerOne
The Bime Bug Bounty Program enlists the help of the hacker community at HackerOne to make Bime more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
Blockchain - Bug Bounty Program | HackerOne
The Blockchain Bug Bounty Program enlists the help of the hacker community at HackerOne to make Blockchain more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
Booking.com - Bug Bounty Program | HackerOne
The Booking.com Bug Bounty Program enlists the help of the hacker community at HackerOne to make Booking.com more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
C2FO - Vulnerability Disclosure Program | HackerOne
The C2FO Vulnerability Disclosure Program enlists the help of the hacker community at HackerOne to make C2FO more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
HackerOne
This community-curated security page documents any known process for reporting a security vulnerability to Cobalt, often referred to as vulnerability disclosure (ISO 29147), a responsible disclosure policy, or bug bounty program.
hackerone.com
Coinbase - Bug Bounty Program | HackerOne
The Coinbase Bug Bounty Program enlists the help of the hacker community at HackerOne to make Coinbase more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
Deconf - Vulnerability Disclosure Program | HackerOne
The Deconf Vulnerability Disclosure Program enlists the help of the hacker community at HackerOne to make Deconf more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
Deliveroo - Bug Bounty Program | HackerOne
The Deliveroo Bug Bounty Program enlists the help of the hacker community at HackerOne to make Deliveroo more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
U.S. Dept Of Defense - Vulnerability Disclosure Program | HackerOne
The U.S. Dept Of Defense Vulnerability Disclosure Program enlists the help of the hacker community at HackerOne to make U.S. Dept Of Defense more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be...
hackerone.com
Dyson - Bug Bounty Program | HackerOne
The Dyson Bug Bounty Program enlists the help of the hacker community at HackerOne to make Dyson more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
ExpressionEngine - Vulnerability Disclosure Program | HackerOne
The ExpressionEngine Vulnerability Disclosure Program enlists the help of the hacker community at HackerOne to make ExpressionEngine more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
GlassWire - Bug Bounty Program | HackerOne
The GlassWire Bug Bounty Program enlists the help of the hacker community at HackerOne to make GlassWire more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
Greenhouse.io - Bug Bounty Program | HackerOne
The Greenhouse.io Bug Bounty Program enlists the help of the hacker community at HackerOne to make Greenhouse.io more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
HackerOne
This community-curated security page documents any known process for reporting a security vulnerability to Helpscout, often referred to as vulnerability disclosure (ISO 29147), a responsible disclosure policy, or bug bounty program.
hackerone.com
HackerOne
This community-curated security page documents any known process for reporting a security vulnerability to Hybrid Saas, often referred to as vulnerability disclosure (ISO 29147), a responsible disclosure policy, or bug bounty program.
hackerone.com
Instacart - Bug Bounty Program | HackerOne
The Instacart Bug Bounty Program enlists the help of the hacker community at HackerOne to make Instacart more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
LeaseWeb - Bug Bounty Program | HackerOne
The LeaseWeb Bug Bounty Program enlists the help of the hacker community at HackerOne to make LeaseWeb more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
HackerOne
hackerone.com
LinkedIn - Bug Bounty Program | HackerOne
The LinkedIn Bug Bounty Program enlists the help of the hacker community at HackerOne to make LinkedIn more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
HackerOne
hackerone.com
HackerOne
This security page documents any known process for reporting a security vulnerability to McAfee, often referred to as vulnerability disclosure (ISO 29147), a responsible disclosure policy, or bug bounty program.
hackerone.com
HackerOne
This community-curated security page documents any known process for reporting a security vulnerability to Massachusetts Institute of Technology, often referred to as vulnerability disclosure (ISO 29147), a responsible disclosure policy, or bug bounty program.
hackerone.com
Mobile Vikings - Vulnerability Disclosure Program | HackerOne
The Mobile Vikings Vulnerability Disclosure Program enlists the help of the hacker community at HackerOne to make Mobile Vikings more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
Nearby Live - Bug Bounty Program | HackerOne
The Nearby Live Bug Bounty Program enlists the help of the hacker community at HackerOne to make Nearby Live more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
HackerOne
This security page documents any known process for reporting a security vulnerability to Nest, often referred to as vulnerability disclosure (ISO 29147), a responsible disclosure policy, or bug bounty program.
hackerone.com
Nimiq - Bug Bounty Program | HackerOne
The Nimiq Bug Bounty Program enlists the help of the hacker community at HackerOne to make Nimiq more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
Paragon Initiative Enterprises - Bug Bounty Program | HackerOne
The Paragon Initiative Enterprises Bug Bounty Program enlists the help of the hacker community at HackerOne to make Paragon Initiative Enterprises more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be...
hackerone.com
HackerOne
This community-curated security page documents any known process for reporting a security vulnerability to ReleaseWire, often referred to as vulnerability disclosure (ISO 29147), a responsible disclosure policy, or bug bounty program.
hackerone.com
HackerOne - Bug Bounty Program | HackerOne
The HackerOne Bug Bounty Program enlists the help of the hacker community at HackerOne to make HackerOne more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
StopTheHacker - Vulnerability Disclosure Program | HackerOne
The StopTheHacker Vulnerability Disclosure Program enlists the help of the hacker community at HackerOne to make StopTheHacker more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
X (Formerly Twitter) - Bug Bounty Program | HackerOne
The X (Formerly Twitter) Bug Bounty Program enlists the help of the hacker community at HackerOne to make X (Formerly Twitter) more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
VK.com - Vulnerability Disclosure Program | HackerOne
The VK.com Vulnerability Disclosure Program enlists the help of the hacker community at HackerOne to make VK.com more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
Yahoo! - Bug Bounty Program | HackerOne
The Yahoo! Bug Bounty Program enlists the help of the hacker community at HackerOne to make Yahoo! more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
hackerone.com
Responsible Vulnerability Disclosure
How security researchers can report security vulnerabilities via our bug bounty program.
help.netflix.com
Documentation for Papertrail - Papertrail
Aggregate Logs Configure your apps and services, hosting services, and integrations to send logs to Papertrail. For common configurations, you can find step-by-step instructions directly in Papertrail. Or look at […]
help.papertrailapp.com
Introduction | Ubuntu
Ubuntu is an open source software operating system that runs from the desktop, to the cloud, to all your internet connected things.
help.ubuntu.com
Bug Report / HitBTC
Contact our development team to leave your feedback or submit a bug report.
hitbtc.com
Product Security
Our goal is to minimize customers’ risk associated with security vulnerabilities by providing timely information, guidance, and more.
honeywell.com
Hootsuite - Security Response
Hootsuite - Social Media Management. With Hootsuite, you can monitor keywords, manage multiple Twitter, Facebook, LinkedIn, and Foursquare profiles, schedule messages, and measure your success.
hootsuite.com
Security Bounty Program • Hunter
The security of our users’ data is a priority. We welcome help from the outside through our bounty program to put our security to the test.
hunter.io
Getting started with a responsible disclosure policy - ICT Institute
A responsible disclosure policy allows people to test the security of your IT. It is a highly recommended security measure for larger organisations: it gives more insight, reduces incidents and helps find security talent. What is responsible disclosure? Many hackers are simply enthusiasts that...
ictinstitute.nl
Security at Instasafe | Responsible Disclosure policy
InstaSafe takes security seriously. Join our vulnerability rewards program or report security issues responsibly. Help us keep InstaSafe secure for everyone.
instasafe.com
KeeperChat: World's Most Secure Messaging App | Keeper Security
Explore KeeperChat, the world's most secure messaging app available on all devices. Protect your communications and conversations whether business or personal.
keeperchat.com
Best Password Manager Security & Data Protection | Keeper Security
Learn more about Keeper's zero-knowledge security architecture, encryption methodologies, hosting environment and data protection. Millions of consumers and thousands of businesses trust Keeper as their preferred web password manager. Start your free trial today!
keepersecurity.com
Responsible Disclosure - Kissflow
We take the responsibility seriously. Learn about our commitment to transparency and social responsibility. Explore our disclosure now.
kissflow.com
Upcoming Crypto Currency Bounty Campaigns in June - kryptocal.com
KryptoCal is a platform which provides cryptocurrency related events/ICO dates at your fingertips. We have created a variety of ways for you to access these events. You can download our app from Apple
kryptocal.com
LocalBitcoins whitehat program - LocalBitcoins
localbitcoins.com
Security
Our Focus on SecurityYour data security is of paramount importance to us at Logentries. Our focus on security cuts across every layer of the Logentries platform, and the service was designed from the ground up as a secure, highly available, and massively scalable multi-tenant log management and...
logentries.com
Reporting Bugs
Reporting Security Issues While we try to be proactive in preventing security problems, we do not assume they’ll never come up. If you believe you’ve found a security problem in a relea…
make.wordpress.org
White Hat Reward - ManageWP
Every day we do our best to make sure ManageWP is running safely and securely. But we’re only human, and there’s always a chance that we missed something. That’s where our mighty contributors came in – they found a weakness in our security, collected the cash reward and got listed as a contributor!
managewp.com
Manalyzer :: Bug Bounty
manalyzer.org
Matomo Security Bug Bounty Programme
Take part in the Matomo Security Bug Bounty Programme and play a crucial role by letting us know of crucial security issues you find using Matomo!
matomo.org
Medium: Read and write stories.
On Medium, anyone can share insightful perspectives, useful knowledge, and life wisdom with the world.
medium.com
Medium’s Bug Bounty Disclosure Program
PLEASE NOTE: As of August, 2023 our bug bounty program is paused. All submitted reports will be address, but we are not accepting new…
medium.com
myTrove
mytrove.co.nz
N26 Bug Bounty Program
Are you a Bug Bounty Hunter? Want to improve the security of a mobile bank? Join our HackerOne program and search for vulnerabilities.
n26.com
Discord | Your Place to Talk and Hang Out
Discord is the easiest way to talk over voice, video, and text. Talk, chat, hang out, and stay close with your friends and communities.
nem.io
Updates about the Nextcloud Bug Bounty Program - Nextcloud
Nearly one year ago we introduced the Nextcloud bug bounty program offering a significant monetary reward for reports of security vulnerabilities within Nextcloud. Security Bug Bounties are a ‘security best practice’ followed by large organizations like Microsoft, Uber, Github, Twitter and Slack...
nextcloud.com
Enterprise-Ready Security and Compliance Certification - SearchPilot
PCI compliant, ISO 27001 certified, HIPAA compliant, and regularly penetration-tested to help you have confidence in the platform’s security.
odn.distilled.net
Why OpenVPN Supports OSTIF's Bug Bounty Program | OpenVPN
OpenVPN is supporting OSTIF’s efforts in engaging the brilliant minds in the community to maintain high cyber security standards.
openvpn.net
Healthcare Product Documentation | Orion Health
Access Orion Health's comprehensive healthcare documentation (DOKI) for resources and support for all our products and services.
orionhealth.com
Contribute bright ideas - ownCloud
Contribute to ownCloud we are supported by a passionate community of users and developers from around the world. See how you can join today!
owncloud.com
Bug Bounty ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
packetstormsecurity.com
How to Report a Bug
panic.com
Home
Modernize storage infrastructure. Make file data bulletproof. Boost productivity & security with hybrid cloud file services & data delivery.
panzura.com
Announcing the Bug Bounty Program
As recent events have shown us, it's not always enough to have good programmers, open-source software and peer reviews in order to ensure no…
paritytech.io
News | Pentu.eu
pentu.eu
Helping you Bank Safely | Security Centre | RBS - Royal Bank of Scotland
Visit our Security Centre to learn about the main types of financial fraud, tips to help yourself bank securely and how we help protect you online.
personal.rbs.co.uk
Bug Bounty Programm for Bugs and Critical Security Issues
Bug Bounty Programm for Bugs and Critical Security Issues
plesk.uservoice.com
Security - PolySwarm
PolySwarm is a crowdsourced threat detection marketplace where security experts & AV companies compete to protect you.
polyswarm.io
Responsible Disclosure Policy | Postmark Support Center
Keeping customer data safe and secure is our top priority.If you’ve discovered a security vulnerability, please do not share it publicly. Instead, report…
postmarkapp.com
Bounty
proof.work
Keeping Proton VPN Secure | Proton
We are launching the Proton VPN Bug Bounty Program. With this program, we are inviting security experts from around the world to try to find weaknesses in Proton VPN.
protonvpn.com
Bosch PSIRT
The Bosch PSIRT is the central point of contact to report cybersecurity information related to products and websites of Bosch and its brands.
psirt.bosch.com
Puppet Security | Puppet by Perforce
Discover Puppet's security policy and how Puppet addresses security vulnerabilities.
puppet.com
Vulnerability Disclosure Program
Qwilr's vulnerability disclosure program aims to recognise security researchers who responsibly disclose vulnerabilities to us.
qwilr.com
Report a vulnerability
This page is the place to report vulnerabilities and security issues with any of our online systems at InternetNZ. Find out more about the process here.
registry.internetnz.nz
Vulnerability Disclosure Policy | Rhino Security Labs
Vulnerabilities discovered by Rhino Security Labs in its research will be disclosed 45 days after the initial report, regardless of patching by the vendor.
rhinosecuritylabs.com
Bug Bounty
We offer a bounty for any security-relevant bugs in our software. Learn more about our bug bounty for exploits, vulnerabilities and ongoing attacks.
ripple.com
Page not found - Rocket.Chat Docs
rocket.chat
Disclosure Policy - SafeHats | Managed Bug Bounty Program
Disclosure Policy 1. Responsible Disclosure Policy Effective disclosure policy requires mutual trust, respect, and transparency between the security researchers and our security team. We request you to report any bug as soon as you discover. We request you not to do any public disclosure before...
safehats.com
Help for your Yahoo Account
safety.yahoo.com
Secure@Sony
The Secure@Sony program accepts reports of bugs that provide a potential attacker with the ability to compromise the integrity, availability or confidentiality of Sony products, services or information technology infrastructure and that meet our submission guidelines.
secure.sony.net
Error Message | SAMSUNG Mobile Security
security.samsungmobile.com
Twilio Terms of Service
With Twilio, unite communications and strengthen customer relationships across your business – from marketing and sales to customer service and operations.
segment.com
Security
The following researchers have taken the time to identify and report security concerns with Sellfy.
sellfy.com
Security & Compliance
Sentry is committed to security and compliance, including protecting your application’s data, eliminating systems vulnerability, and ensuring access continuity.
sentry.io
Security & Responsible Disclosure
SifterApp.com security information and responsbile disclosure policy.
sifterapp.com
Build your wealth in ounces
We Offer Gold and Silver Coins, Rounds, Wafers and Bars including Silver Maple Leaf and Gold Maple Leaf coins
silvergoldbull.ca
Bug Bounty | Silver Gold Bull UK
We Offer Gold and Silver Coins, Rounds, Wafers and Bars including Silver Maple Leaf and Gold Maple Leaf coins
silvergoldbull.co.uk
Report a Vulnerability | Legal
Report a vulnerability. If you believe you have found a security vulnerability on Slack, please let us know right away so we can investigate promptly. Thank you.
slack.com
Report and track bugs | Android Open Source Project
source.android.com
Secure Payments Systems - Trusted Payment Solutions - Square
Square’s secure payment system is dedicated to protecting your business from frauds, chargebacks and more. Learn how Square handles payment security.
squareup.com
Dräger Security | Coordinated Disclosure Statement
Dräger Product Security - Coordinated Disclosure Statement. Here's how you can report a security or privacy vulnerability to Dräger.
static.draeger.com
Vulnerability Reporting Policy
We welcome vulnerability reports from independent security researchers via [email protected].
success.coupa.com
Vulnerability response|Trend Micro Business Success Portal
success.trendmicro.com
Security audits of 1Password
1Password products have been reviewed by multiple independent security firms.
support.1password.com
Bug Reporting Program
Find a bug, get Anghami Plus! Anghami will gift users who report a serious bug. Rewards can range from a month to months of Anghami Plus depending on the severity of the vulnerability ■ OUR REW...
support.anghami.com
Does BitPay have a bug bounty program?
BitPay values its close relationship with the security research community. To show its appreciation for external contributions, BitPay maintains a Bug Bounty Program designed to reward responsible ...
support.bitpay.com
How do I report a bug?
If you think that Duolingo is not behaving as expected, we would appreciate it if you'd let us know. We collect bug reports sent by users to detect emergencies and other issues. Please note that bu...
support.duolingo.com
Instamojo Bug Bounty Policy
Eligibility Reporter eligibility You must NOT be an employee of Instamojo within the last 6 months. You must NOT be an immediate family member of an Instamojo employee. You must be a citizen of In...
support.instamojo.com
Отчет по уязвимостям: Общая информация
Узнайте больше об отчете по уязвимостям от Лаборатории Касперского.
support.kaspersky.com
Lenovo Vulnerability Disclosure Policy - Redirect - Lenovo Support US
support.lenovo.com
GDPR Compliance
Purpose: The purpose of this article is to provide information to Outreach Users regarding General Data Protection Regulation (GDPR) compliance. General Data Protection Regulation (GDPR) Complian...
support.outreach.io
Do you have a “bug bounty” if I find an issue with your site?
**If you simply need help with your account, please contact Customer Support via email to [email protected]** At Phrendly, keeping our members' personal information private and secure is a pri...
support.phrendly.com
Vulnerability Disclosure Program
Important Notice Effective January 1, 2020, Sphero's vulnerability disclosure program is closed. Reports submitted prior to January 1, 2020 will be brought to closure. Reports submitted after Decembe…
support.sphero.com
Report Site Vulnerabilities
At Upwork, we take the security of our users very seriously. Upwork values the work done by security researchers in improving the security of our products and service offerings. We are committed to...
support.upwork.com
Bug Bounty Program / Reporting Security Issues
Building the world-class engineering team.
tech.showmax.com
Create with Spring, sell on social - Spring. For creators.
Create and sell products to your fans with Spring. Creators can monetize their content and earn their fair share. Plus, it’s free.
teespring.com
Crypto Futures and Options Exchange - Deribit
World's biggest Bitcoin and Ethereum Options Exchange and the most advanced crypto derivatives trading platform with up to 50x leverage on Crypto Futures and Perps.
test.deribit.com
CargoCoin - Bounty Hunter & Affiliate Program
CargoCoin - Bounty Hunter & Affiliate Program
thecargocoin.com
Mbed TLS
A C library implementing cryptographic primitives, X.509 certificate manipulation and the SSL/TLS and DTLS protocols.
tls.mbed.org
TorGuard VPN’s Bug Bounty Program |
torguard.net
Security
Read our Security page to find out how we make sure that using the Transloadit service is as safe as it can be.
transloadit.com
Privacy & Security | Trezor
Trezor is the safest crypto ecosystem-no personal data collected, seed generated & stored offline, full crypto custody.
trezor.io
Trustly
trustly.com
The TYPO3 Security Team
typo3.org
Security and Umbraco
Security is one of the main factors when creating digital projects. Discover how we make sure our product and services stay secure.
umbraco.com
Unity QA: Building quality with passion
Unity QA provides building tools, frameworks and test suites for both end-users and corporate partners.
unity3d.com
Your Cobrowsing Software Solution
Discover cobrowsing solutons with Upscope's cobrowsing software. Navigate websites with others in real-time for seamless teamwork and enhanced customer support.
upscope.io
Your Cobrowsing Software Solution
Discover cobrowsing solutons with Upscope's cobrowsing software. Navigate websites with others in real-time for seamless teamwork and enhanced customer support.
upscope.io
Report a Bug - Blizzard Support
us.battle.net
Security on Vimeo
Join the web’s most supportive community of creators and get high-quality tools for hosting, sharing, and streaming videos in gorgeous HD with no ads.
vimeo.com
CERT Coordination Center
The Vulnerability Notes Database provides information about software vulnerabilities.
vulcoord.cert.org
Vulnerability Disclosure
Envato Product Security Security and privacy at Envato starts with our values. At Envato, we understand security and privacy is important because we are in it for the community. This means we’re committed to working with our community, including through our security program to recognize helpful...
webuild.envato.com
Responsible disclosure | WerkenbijDefensie.nl
Responsible disclosure Defensie wil zich inspannen voor optimale veiligheid en hecht grote waarde aan de security van haar eigen ICT-systemen. Toch valt noo...
werkenbijdefensie.nl
WeTransfer is the simplest way to send your files around the world
WeTransfer is the simplest way to send your files around the world
wetransfer.com
Wickr | Bug Bounty Program
If you believe you have found security vulnerability in the Wickr Apps, we encourage you to report it to our Bug Bounty Program. Before you report a vulnerability, please review the program rules, including a responsible disclosure policy, rewards guidelines and the scope of the program.
wickr.com
Report a security issue - 23andMe AU, DE, FR & EU
Submit any issues or vulnerabilities with the 23andMe website, product experience or applications.
www.23andme.com
Accenture Responsible Disclosure | Let there be change
Responsible Disclosure is a voluntary program through which Accenture will engage with parties who identify and report potential security vulnerabilities. Read more.
www.accenture.com
White Hat
Before reporting any security vulnerabilities to Accredible, please review the information on our Whitehat page including the process and exceptions sections.
www.accredible.com
Security – Actility | Global Leader in IoT connectivity solutions
Welcome to Actility Bug Bounty! Independent security researchers and our user community are welcome to help keeping Actility and its users secure.
www.actility.com
Support and Training
www.aerohive.com
Customer Service - Airbnb Help Center
www.airbnb.com
Responsible Disclosure
www.airmilesshop.nl
Learn all about security & compliance at Algolia
Algolia’s search security team regularly tests for security issues and exploits. Algolia is SOC 2 & SOC 3 Compliant, ISO certified, and SAML SSO ready.
www.algolia.com
Page Not Found
404 Page not found! Sorry, but the page you were looking for could not be found. You can return to our homepage, or contact us if you can't find what
www.armis.com
Security | Artsy
Artsy is the world’s largest online art marketplace. Browse over 1 million artworks by iconic and emerging artists from 4000+ galleries and top auction houses.
www.artsy.net
Report a Potential Security Vulnerability
www.avira.com
Responsible Disclosure Statement
BASF investigates all reports of security vulnerabilities affecting BASF web presence. If you are a security researcher and believe you have found a security vulnerability, please send an e-mail to us at [email protected].
www.basf.com
Page Not Found
www.belden.com
Vulnerability Security Testing & DAST | Beyond Security
Secure your applications and networks with the industry's only network vulnerability scanner to combine SAST, DAST and mobile security.
www.beyondsecurity.com
Online trading with Deriv | Simple. Flexible. Reliable.
Trading platforms designed with you in mind.
www.binary.com
Bug Bounty | Bitcoin.de
www.bitcoin.de
Bug Bounty
www.bitdefender.com
Whitehat bonus - bitcoinrekening
www.bitmymoney.com
Responsible Disclosure Policy | HRMS - Human Capital Management - BizMerlinHR
Responsible Disclosure of Security Vulnerabilities
www.bizmerlin.com
Blinksale | Easy Invoicing & Payments
Blinksale makes it easy to send invoices and track payments—so you can focus on doing more of the work that gets you paid.
www.blinksale.com
The site is temporarily down
www.bountysource.com
Box Vulnerability Reporting Policy
If you believe you've identified a potential security vulnerability, please report it to us right away. We will investigate all legitimate reports and do our best to quickly address the problems.
www.box.com
Responsible Disclosure | Braintree Payments
We take security vulnerabilities very seriously. We appreciate your help in notifying us of issues in a responsible manner.
www.braintreepayments.com
#1 Crowdsourced Cybersecurity Platform | Bugcrowd
Bugcrowd teams with elite security researchers to reduce risk & improve security ROI through our bug bounty, pen testing, & vulnerability disclosure programs.
www.bugcrowd.com
Instructure | Bugcrowd
Learn why Instructure switched from traditional penetration testing to an on-demand bug bounty program for their Annual Security Audit.
www.bugcrowd.com
Responsible Disclosure Policy
When vulnerabilities are found we’d like to learn of them as soon as possible, allowing us to take swift action to shore up our security.
www.bynder.com
The security of your data matters to us
The security of your data matters to us. Here's everything you need to know about the ways Campaign Monitor keeps maintains our security.
www.campaignmonitor.com
Security & Responsible Disclosure | Chalk
Chalk employs bank grade security and industry best practices to ensure that your data is safe and secure.
www.chalk.com
JPMorgan Chase Responsible Disclosure Program
We want to hear from you if you have information related to potential security vulnerabilities of JPMorgan Chase products and services. We value your work and thank you in advance for your contribution.
www.chase.com
Kwetsbaarheid melden | CJIB.nl
Waar kan ik melden dat ik een zwakke plek heb ontdekt in een ICT-systeem van het CJIB? Een zwakke plek in een ICT-systeem van de Rijksoverheid kunt u melden bij het Nationaal Cyber Security Centrum (NCSC). Het CJIB is onderdeel van de Rijksoverheid. Daarom kunt u een zwakke plek in een...
www.cjib.nl
Vulnerability Disclosure Policy
This policy provides our guidelines for reporting vulnerabilities to Cloudflare.
www.cloudflare.com
Bug Bounty Program & Crypto Bounty Campaign
As part of our ongoing effort to keep your money safe and information secure, we run a bug bounty program. Visit CoinJar to learn more.
www.coinjar.com
Thank you | Compose
www.compose.io
craigslist | contact form error
www.craigslist.org
Free credit scores and tools to make financial progress
See your free credit scores, reports and personalized tips and tools to help you achieve your financial goals. Join over 100 million members making financial progress.
www.creditkarma.com
Bug Bounty program
www.crowdfense.com
BlackBerry – Intelligent Security. Everywhere.
BlackBerry provides organizations and governments with the software and services they need to secure the Internet of Things. Learn how BlackBerry Cybersecurity powered by Cylance AI can protect your people, network, and data.
www.cylance.com
Dash Bug Bounty Program
This thread is for updates and technical discussion of the Dash Bug Bounty Program. The Dash Bug Bounty Program is located here: https://bugcrowd.com/dashdigitalcash The Dash Bug Bounty Program is a DashIncubator project that is being managed by @jimbursch. Funding for the project was...
www.dash.org
Security | Delivery Hero
Delivery Hero is the world's leading local delivery company. We are on a mission to deliver an amazing experience - fast, easy, and to your door.
www.deliveryhero.com
DJI To Offer “Bug Bounty” Rewards For Reporting Software Issues - DJI
DJI, the world’s leader in civilian drones and aerial imaging technology, is establishing a “bug bounty” program to reward people who discover security issues with DJI software.
www.dji.com
Secure Software Supply Chain - Docker
Docker offers secure software supply chain solutions for development teams. Build, share, and run secure applications without reducing productivity.
www.docker.com
Security | Doorkeeper
www.doorkeeper.jp
Security Response
Keeping our customers safe is a huge responsibility, and our highest priority. We pledge to deal with any security reports quickly, responsibly, and with the utmost care.
www.duosecurity.com
Security Vulnerability Disclosure Program
Also check out our EFF Security Hall of Fame to see the heroes that have already reported security vulnerabilities to us!OverviewEFF is committed to protecting the privacy and security of users of our software tools. Our Vulnerability Disclosure Program is intended to minimize the impact any...
www.eff.org
EMP Trust HR Solution | Security Policy
EMPTRUST offer a Human Resource information solutions for a global workforce to meets new hire and employee onboarding efficiently.
www.emptrust.com
Report Security Vulnerabilities
Best IT security solutions for your home and business devices. Try ESET antivirus and internet security solutions for Windows, Android, Mac or Linux OS.
www.eset.com
Responsible Disclosure
At Erasmus University Rotterdam we work hard to maintain and improve the security of our systems; nevertheless vulnerabilities may occur in our systems. Our…
www.eur.nl
ExpressVPN’s Bug Bounty Program | ExpressVPN
Learn about ExpressVPN’s in-house bug-bounty program and how you can receive cash rewards for finding security flaws.
www.expressvpn.com
Vulnerability Reward Program
Discover WithSecure's™ vulnerability reward program. See the guide to reporting e-mail and server security issues, Linux security vulnerabilities, among others.
www.f-secure.com
Meta Bug Bounty
Meta Bug Bounty. Gefällt 367.007 Mal · 70 Personen sprechen darüber. Meta's Bug Bounty program provides recognition and compensation to security researchers practicing responsible disclosure....
www.facebook.com
Security Issue Reporting
If you think you have found a security vulnerability in Fastmail, report it to us straight away. We promise to investigate all legitimate reports in a timely manner and fix any issues as soon as we can.
www.fastmail.com
Firebase Support
Get help quickly with Firebase support. Read our FAQs, Release notes, and guides, ask the community, then get direct support from the Firebase team.
www.firebase.com
Report a Security Issue | FireEye
Have you discovered a potential cyber security issue? Visit FireEye and report it here.
www.fireeye.com
FIRST bug bounty program
www.first.org
Security Contact
Foxy’s hosted cart & payment page allow you to sell anything, using your existing website or platform.
www.foxy.io
Responsible Disclosure of Security Vulnerabilities - FreshBooks
FreshBooks Responsible Disclosure policy outlines the guidelines for reporting any security vulnerabilities or concerns regarding our services.
www.freshbooks.com
Responsible disclosure GAMMA
GAMMA vindt de veiligheid en privacy van haar klanten erg belangrijk. Als je een zwakke plek in de beveiliging van één van onze systemen vindt, horen we dat graag.
www.gamma.nl
Security and Privacy - Harvest
www.getharvest.com
Android and Google Devices Security Reward Program Rules | Google Bug Hunters
The Android and Google Devices Security Reward program recognizes the contributions of security researchers who invest their time and effort in helping us secure our devices and platforms. Through this program, we provide monetary rewards and public...
www.google.com
Chrome Vulnerability Reward Program Rules | Google Bug Hunters
ATTENTION As of 4 February 2024, Chromium has migrated to a new issue tracker, please report security bugs to the new issue tracker using this form . Please see the Chrome VRP News and FAQ page for more updates and information. The Chrome...
www.google.com
Open Source Security Patch Rewards
The Patch Rewards program rewards proactive improvements to security in open source projects.
www.google.com
Google and Alphabet Vulnerability Reward Program (VRP) Rules | Google Bug Hunters
Services in scope Qualifying vulnerabilities Non-qualifying vulnerabilities Reward amounts for security vulnerabilities Report Quality Rewards are adjusted based on the quality of the report. The main factors considered are: Demonstrated security...
www.google.com
Security at Tinder
With 43 billion matches to date, Tinder® is the world’s most popular dating app, making it the place to meet new people.
www.gotinder.com
HackerEarth Bounty Program - program | HackerEarth
HackerEarth is a global hub of 5M+ developers. We help companies accurately assess, interview, and hire top developers for a myriad of roles.
www.hackerearth.com
HackerRank
Join over 16 million developers in solving code challenges on HackerRank, one of the best ways to prepare for programming interviews.
www.hackerrank.com
Dropbox Security & Compliance Trust Center
The information and assurance you need to feel confident in beginning a more enlightened way of working with Dropbox.
www.hellosign.com
Heroku Security | Heroku
www.heroku.com
Security Center | HID Global
Welcome to the HID Global Security Center. We take physical and digital security very seriously, with our experienced teams continuously working to strengthen security across our portfolio. To help
www.hidglobal.com
Bug Bounty & Vulnerability Research Program
Honeycomb encourages responsible disclosure of security vulnerabilities through our bug bounty program. Learn more about the basic features of our policy.
www.honeycomb.io
Hostinger Responsible Disclosure Policy and Bug Reward Program
Hostinger Responsible Disclosure Policy and Bug Reward Program are covered. Please, read it carefully and get familiar with this agreement.
www.hostinger.com
Contribute to Coding – Hyperledger Foundation
Our projects are built by active community members – learn how to utilize and contribute to our development tools.
www.hyperledger.org
Responsible Disclosure of Security Vulnerabilities
We're working with the security community to make iFixit safe for everyone.
www.ifixit.com
Responsible Disclosure Program
IKEA valora muchísimo la confianza que depositan los clientes. Por eso es tan importante la seguridad de nuestro sitio web. Si has descubierto vulnerabilidades en alguno de nuestros servicios, te agradeceríamos que nos informaras al respecto
www.ikea.com
Responsible Disclosure - Inflectra
www.inflectra.com
ING.com security
ING provides the following general information to answer any concerns that you may have around the security of the internet, inclu
www.ing.com
Security
Customer confidence and data security is critical to everything we do at Intercom.
www.intercom.com
Bug Bounty & Agile Pentesting Platform
Europe’s leading bug bounty platform and penetration testing services provider.
www.intigriti.com
Intrasurance overgenomen door Heinenoord Assuradeuren - Heinenoord Assuradeuren
www.intrasurance.com
MOVEit Secure Managed File Transfer Software | Progress
MOVEit is automated and secure Managed File Transfer software for sensitive data and advanced workflow automation capabilities without the need for scripting.
www.ipswitch.com
Bug Bounty - JetApps
Responsible Disclosure of Security Vulnerabilities We’re working with the security community to make our products safer for everyone! Security researchers play a vital role in safeguarding digital information. All vulnerability reports must adhere to our Bug Bounty Terms and Conditions. The...
www.jetapps.com
Report a Security Vulnerability | Juniper Networks US
Optimize security policies and thwart cyberattacks with adaptive threat intelligence integrated into your network. Please report any potential or real instances of security vulnerabilities with any Juniper Networks product to the Juniper Networks Security Incident Response Team.
www.juniper.net
Vulnerability Disclosure Policy
Vulnerability Disclosure Policy (“Policy”) outlines steps for reporting vulnerabilities to us, what we expect, and what you can expect from us.
www.kaseya.com
KeepKey - Hardware Wallet | ShapeShift
Check out KeepKey - Hardware Wallet to help protect your cryptocurrencies and safeguard your assets from hackers.
www.keepkey.com
LiveAgent Bug Bounty Program | LiveAgent
Data security is one of our first priorities and we want to know about our blind spots. If you're a researcher we will appreciate and reward your help.
www.ladesk.com
LiveAgent Bug Bounty program
Vulnerability disclosure program LiveAgent aims to keep its service safe for everyone, and data security is of utmost importance. Our Vulnerability
www.ladesk.com
LähiTapiolan Bug Bounty -ohjelma täyttää vuoden – suurin palkinto nousee 50 000 euroon | LähiTapiola
LähiTapiolan Bug Bounty -ohjelma täyttää vuoden – suurin palkinto nousee 50 000 euroon
www.lahitapiola.fi
Transparent Security & Customer Data Protection - LastPass
LastPass pledges to protect our customers’ data, passwords, and vaults. We adhere to values of security, communication, and continuous improvements.
www.lastpass.com
Bug Bounty Program
The whispers from the Donjon of Ledger. The latest news about security research at Ledger.
www.ledger.fr
Security | Legal Robot
Know what you sign. Legal Robot uses machine learning to understand contracts. Snap a picture for instant analysis and write better contracts using AI.
www.legalrobot.com
Malwarebytes Bug Bounty and Vulnerability Disclosure Program
Malwarebytes welcomes and encourages independent researchers to report vulnerabilities in our products.
www.malwarebytes.org
Drop Bounty
Join our community of passionate people to find and follow your interests in high quality mechanical keyboard & audiophile products. Discover innovative products, made possible by the collective wisdom of our users.
www.massdrop.com
Security Vulnerability Report
If you believe you have discovered a security vulnerability in a Mattermost product, please fill out this form to report it.
www.mattermost.org
Responsible Disclosure | Maximum
Optimizing safety when it comes to the ICT systems is a top priority for Maximum. However, as such systems remain vulnerable, possible loopholes and weakness...
www.maximum.com
Responsible Disclosure Policy
Mimecast understands that protecting customer data is paramount to your companies security. Learn more about it in our Responsible Disclosure Policy.
www.mimecast.com
Mollie - Responsible disclosure
An advanced solution to accept payments, optimise conversion, and access funding.
www.mollie.com
Security Bug Bounty Program
www.mozilla.org
NDIX
www.ndix.de
NETGEAR Product Security | NETGEAR
Discover how we strive to earn and maintain the trust of our customers by delivering products that will protect the privacy and security of their data.
www.netgear.com
Nmbrs | Cloud HR and Payroll software
At Nmbrs, we regard the security of our platform, network and products, as the highest priority. Therefore we constantly monitor our business network.
www.nmbrs.com
Ein weltweit führender Anbieter von Cybersicherheit für Privatanwender | NortonLifeLock
NortonLifeLock bietet umfassende Schutzlösungen für Ihre Cybersicherheit und trägt dazu bei, Ihren persönlichen Anforderungen sowie denen Ihrer Familie in Sachen Gerätesicherheit, Schutz vor Identitätsdiebstahl, Online-Privatsphäre sowie Schutz von Heim und Familie gerecht zu werden.
www.nortonlifelock.com
Press | Our Company | Yahoo Inc.
Verizon Media Platform blogs cover current product development news, platform information, and opinions on technology and issues impacting our industry.
www.oath.com
Responsible Disclosure
www.occrp.org
Responsible Disclosure of Odoo Security Vulnerabilities
We want Odoo to be safe for everyone. If you've discovered a security vulnerability, please help us by reporting it in a responsible manner. Please find here our policy and our guidelines for reporting security issues.
www.odoo.com
Bug Bounty Program | Offensive Security
Find out about OffSec's bug bounty program. We regularly conduct vulnerability research and are proponents of coordinated disclosure.
www.offensive-security.com
Olark: Security at Olark
www.olark.com
OneLogin Compliance Commitment: Data & Privacy are #1
OneLogin is ISO 27001 Certified, issues SOC 1 and SOC 2 Type 2 reports, and meets U.S. Privacy Shield and GDPR requirements.
www.onelogin.com
https://www.open-xchange.com/resources/ox-blog/article/going-public-with-our-new-bug-bounty-program/
Vulnerabilities
If you think you have found a security bug in OpenSSL, please report it to us. Show issues fixed only in OpenSSL 3.3, 3.2, 3.1, 3.0, 1.1.1, 1.1.0, 1.0.2, 1.0.1, 1.0.0, 0.9.8, 0.9.7, 0.9.6 Note: All OpenSSL versions before 1.1.1 are out of support and no longer receiving updates. Extended support...
www.openssl.org
Policy
Opera is committed to your security, and we have a long and proven track record of fulfilling that commitment. Below, we take you through the process of how we handle security vulnerabilities when they are discovered and what steps we take to keep you, and others who are using our product, safe...
www.opera.com
CERT Orange
C’est la structure opérationnelle chargée de gérer les incidents de sécurité informatique pouvant impacter les activités du Groupe, entités et filiales incluses.
www.orange.com
- OVHcloud Blog
Accelerating with OVHcloud Engineering Partner Program Startup Program Product News Ecosystem Accelerating with OVHcloud Our latest updates on OVHcloud key business achievements, communities events and how we help our customers accelerate their transformation more… OVHcloud Engineering Follow...
www.ovh.co.uk
Responsible Disclosure
Through its SaaS-based platform, PagerDuty empowers developers, DevOps, IT operations and business leaders to prevent and resolve business-impacting
www.pagerduty.com
PayPal - Bug Bounty Program | HackerOne
The PayPal Bug Bounty Program enlists the help of the hacker community at HackerOne to make PayPal more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
www.paypal.com
Bug Bounty Program | Paysera
Notify us about a security breach or website vulnerabilities and receive a reward!
www.paysera.com
Philips Responsible Disclosure Statement | Philips
Philips is committed to ensuring the safety and security of patients, operators and customers who use our products and services.
www.philips.com
POLi Payments | Australia’s leading real-time online debit payment system
POLi is Australia’s leading real-time online debit payment method. It offers a secure alternative to PayPal, BPAY and credit cards by giving customers the option to pay from their internet banking.
www.polipayments.com
Responsible disclosure | Port of Rotterdam
www.portofrotterdam.com
Private Internet Access’ Vulnerability Disclosure Program
Learn how to participate in PIA VPN’s vulnerability disclosure program. Report bugs to improve the security of our products. Help us build a safer internet.
www.privateinternetaccess.com
Welcome Aboard, Bug Bounty Hunters!
At Pushwoosh, we take the security of our users’ data very seriously. We introduce Bug Bounty program and encourage those bounty hunters who have discovered potential security vulnerabilities in Pushwoosh service to disclose it to us in a responsible manner. We will work with security...
www.pushwoosh.com
Reporting a bug - QEMU
www.qemu.org
QIWI - Bug Bounty Program | HackerOne
The QIWI Bug Bounty Program enlists the help of the hacker community at HackerOne to make QIWI more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
www.qiwi.ru
Qualcomm Product Security | Qualcomm
Qualcomm Incorporated and its subsidiaries understand that maintaining a large variety of products comes with certain responsibilities. We take security vulnerabilities very seriously and always seek to respond appropriately.
www.qualcomm.com
White Hat Disclosure Policy | Rainforest QA
This page details our white hat disclosure policy, what we accept, how, as well as our hall of fame for accepted issues.
www.rainforestqa.com
Coordinated Vulnerability Disclosure (CVD) Policy
Learn more about our Coordinated Vulnerability Disclosure (CVD) Policy
www.rapid7.com
Razer Bug Bounty Program | Razer United States
Help us find bugs in our Synapse, Chroma, Cortex and other Razer software and stand to be rewarded.
www.razer.com
Disclosure Policy | RCE Security
www.rcesecurity.com
Responsible disclosure
The ICT systems of the Dutch Judiciary have to be safe. Contact point if you find vulnerabilities in the ICT-systems of the Judiciary.
www.rechtspraak.nl
View Our Company Disclosure
At Salesforce, trust is our #1 value and we take the protection of our customers’ data very seriously.
www.salesforce.com
Advanced Server Access | Okta
Okta Advanced Server Access provides a centralized control plane and zero trust server, allowing SSO extensions to your Linux and Windows servers via SSH & RDP.
www.scaleft.com
Data security, PCI compliance and fraud protection
Our online payment systems are PCI DSS compliant. Prevent fraudulent transactions with SecurePay's award winning fraud solution.
www.securepay.com.au
Report a Security Vulnerability
It is crucial that any potential security vulnerability is reported immediately to ensure they are resolved appropriately. Click here to contact us.
www.secureworks.co.uk
Privacy and Terms - Overleaf, Online LaTeX Editor
An online LaTeX editor that’s easy to use. No installation, real-time collaboration, version control, hundreds of LaTeX templates, and more.
www.sharelatex.com
Shopify Bug Bounty Program
We encourage security researchers to register for our bugbounty program.
www.shopify.in
Bug Bounty Program Launch | Silent Circle
Silent Circle launches its Bug Bounty Program, enabling the security researcher community to publicly submit and track security bugs.
www.silentcircle.com
Responsible disclosure
Simpplr aims to keep its Services safe for everyone, and data security is of utmost priority.
www.simpplr.com
SiteGround Website Terms of Use
SiteGround Terms of Use. Find every detail about the legal agreement between you and SiteGround.com.
www.siteground.com
Security Standards | Slido - Audience Interaction Made Easy
We take security of your data very seriously. Read more about how we handle your data and the security standards we have in Slido.
www.sli.do
Responsible Disclosure Policy for Security Vulnerabilities
Smokescreen works closely with security researchers to identify and fix any security vulnerabilities in our infrastructure and products. If you believe you have found a security issue, we encourage you to notify us and work with us on the lines of this disclosure policy.
www.smokescreen.io
Bounty - Solar Accounts
www.solaraccounts.co.uk
Secure Managed Cloud - Solvinity
Een betrouwbare, veilige IT-omgeving nodig? Solvinity ondersteunt je met Secure Managed Cloud services. Lees alles over onze services en organsiatie.
www.solvinity.com
Cybersecurity as a Service Delivered | Sophos
We Deliver Superior Cybersecurity Outcomes for Real-World Organizations Worldwide with a Broad Portfolio of Advanced Security Products and Services.
www.sophos.com
Spokeo | People Search | Security
People search engine and free white pages finds phone, address, email, and photos. Find people by name, email, address, and phone for free.
www.spokeo.com
Zip Business Capital | Small business loans
Need funds to grow your business? Get an unsecured line of credit of up to $500,000. Decisions within 24 hours and terms up to 5 years.
www.spotcap.co.nz
Bug Bounty Program | Spreaker Help Center
www.spreaker.com
Security & Compliance at Sqreen | Sqreen
Keeping our customers' data safe is our priority. Learn what security best practices we follow to protect our customers.
www.sqreen.io
Starbucks - Bug Bounty Program | HackerOne
The Starbucks Bug Bounty Program enlists the help of the hacker community at HackerOne to make Starbucks more secure. HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited.
www.starbucks.com
StarLeaf - Secure, reliable, intuitively simple enterprise video meetings
StarLeaf brings people together to work better, with enterprise-grade video meetings that are secure, reliable and intuitively simple.
www.starleaf.com
Stellar | Bug Bounty Program
The Stellar Bug Bounty Program provides bounties for vulnerabilities and exploits discovered in the Stellar protocol or any of the code in our repos.
www.stellar.org
Bug Bounty: closes security gaps | Swisscom
Our Bug Bounty programme supports the reporting and elimination of security gaps and weak points in our products and services.
www.swisscom.ch
Blockchain, Bug Bounties and Björk
Two days ago, the US Securities and Exchange Commission clarified their position on cryptocurrencies, a hot topic in the investment world. It is also one that seems to get more heated with each rise and fall in their value. In the SEC’s announcement, they mandated that all coin exchanges must...
www.synack.com
Security Bug Bounty Program | Synology Inc.
We operate the Security Bounty Program to give recognition and monetary rewards to researchers that have identified potential vulnerabilities of our products.
www.synology.com
Responsible Vulnerability Disclosure Best Practices | Black Duck Blog
Explore best practices for responsible vulnerability disclosure to mitigate risks and prevent malicious use of technical weaknesses in software security.
www.synopsys.com
GDPR
Talent LMS cares about its users’ data confidentiality, integrity, privacy and availability. Read about the ways we protect the data gathered by our learning management system. If in doubt, contact us.
www.talentlms.com
Closing security gaps
Deutsche Telekom is starting its own Bug Bounty program to make its products more secure.
www.telekom.com
Product Security | Tesla
Tesla is committed to working with the community to verify, reproduce and respond to legitimate reported product vulnerabilities. Learn more about Tesla's product security policy and responsible disclosure guidelines.
www.tesla.com
Quality Assurance
Quality Assurance - powered by crowdtesting and device cloud: Challenge bugs and performance issues with Testbirds QA services
www.testbirds.com
Responsible Disclosure of Security Vulnerabilities
The Atlantic covers news, politics, culture, technology, health, and more, through its articles, podcasts, videos, and flagship magazine.
www.theatlantic.com
Traveloka Bug Bounty Program
Traveloka is committed to keep its services safe for everyone, which is why data security is our utmost priority. Traveloka welcomes any contributions and information by security researchers who find various types of security vulnerabilities seen in our services, in which case we would be...
www.traveloka.com
Accept card payments safely and easily worldwide | TrustPay
Receive payments from millions of Visa and MasterCards holders worldwide and accept payments safely and easily in 170+ currencies.
www.trustpay.eu
Reporting Security Vulnerabilities | Twilio
www.twilio.com
Welcome All Bug Bounty Hunters
Today we’re excited to announce our official bug bounty program and a first of its kind loyalty reward program for bounty hunters. Learn more now.
www.uber.com
Ubiquiti - Rethinking IT
Technology platforms for Internet Access, Enterprise, and SmartHome applications.
www.ubnt.com
Security
For Unitag, security is a priority. Help us make the platform an increasingly safe place.
www.unitag.io
Private banking
Persoonlijk, deskundig en resultaatgericht. Uw wensen en doelen staan centraal en u krijgt deskundig advies op maat.
www.vanlanschot.nl
Report Security Vulnerability | Verizon Wireless
See a security vulnerability? Say something. Tell Verizon more about your issues with phones, internet, business services or anything else so we can help!
www.verizonwireless.com
Security
www.viewpost.com
Cyber Security | Vodafone
Die Sicherheit unserer Netze, Systeme und Kund:innen hat höchste Priorität - und ist ein grundlegender Bestandteil unseres Unternehmenszwecks. Alles zu Cyber Security bei Vodafone findest Du auf dieser Seite.
www.vodafone.de
Security and Operations Control Center - Vrije Universiteit Amsterdam
SOCC investigates and coordinates matters pertaining to information security incidents involving staff, students and/or systems at VU Amsterdam.
vu.nl
WhatRuns - Discover Website Technologies | Identify CMS, Frameworks, and More
WhatRuns - Discover what runs a website
www.whatruns.com
Xen Security Problem Response Process - Xen Project
This document has come in effect in December 2011 and will be reviewed periodically: see Change History for a detailed list of changes. Introduction Computer systems have bugs. Currently recognised...
www.xenproject.org
Zynga’s Responsible Disclosure Program - Zynga
Zynga is dedicated to providing a safe and fair gaming environment for our players. If you believe you’ve found a security vulnerability or game logic bug (each, a “Vulnerability”) in our applications or services (our “Services”) that could adversely affect Zynga or our players, or give an...
www.zynga.com
Security Exploit Bounty Program
Closure of Public Bounty ProgramAs of 20 January 2022 we have closed our public bounty program in favour of a managed program through HackerOne. While our HackerOne program is not currently public, we still welcome submissions from security researchers! Please use the form linked below to...
zapier.com
Home | Firo - Privacy-preserving cryptocurrency
Firo is a digital currency with a focus on setting privacy standards.
zcoin.io
Contact Us | ZenMate VPN | Security made simple
Having trouble or have a question? Reach out and contact us!
zenmate.com