Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Add as a preferred source on Google
bounty program

Facebook Bounty: India again holds the Top position

Almost every time, when a person heard about ' Hackers ' they get a negative meaning for hackers as people think that they always do bad a…

Yahoo announces new Bug Bounty Program

This is great news for the Bug Hunter and Security researcher that, now they can earn more by there bug reporting. On the List of the Bug Bounty R…

Apple Just Tripled Down on iPhone Security With $5 Million Bounty

Apple has unveiled the most lucrative bug bounty program in the tech industry, doubling its top single reward to $2 million—with potential bonuses pu…

Microsoft Pays $100,000 for Windows 8.1 Exploit

As yesterday, Microsoft announced the name of the people who's vulnerability are eligible for the Internet Explorer 11, as on the post Micro…

Facebook rewarded $33,500 as bounty for Remote Code Execution

Security concern the major role on the company's infrastructure internally or externally. For this concern many of the firms have announced th…

Critical Authorization Bypass and XSS Vulns Patched in POST SMTP Mailer WordPress Plugin - Update Now

The best Mailer SMTP Plugin for WordPress, POST SMTP Mailer plugin, which has 300,000+ active installations fixed critical security vulnerabilities t…

Twitter Confirmed Breach of 5.4 Million Users Account

At the end of last month a user on the famous hacking forum, Breached Forums goes by the username 'devil', was selling 5.4million Twitter use…

Hacker Sells 5.4 million Twitter Users Data for $30,000

Update :  Added Twitter comments Twitter officially confirmed that a January breach led to the leak of information connected to 5.4 million accounts…

Bybit Hack Linked to Lazarus Group, Exchange Offers Bounty

The cryptocurrency industry's largest hack has taken a new turn as security researchers identify North Korea's Lazarus Group as the perpetra…

Mega Bugs Bounty Program Launched

As recently one of the biggest file hosting site have relaunched after the shut down of "Mega Upload" named as " MEGA ". They…

Cross Domain Policy Bug in Yahoo Mail

Its going to be a years that Yahoo had announced its bug bounty programs, and the bounty programs had really helped the firm/organisation and the …

Twitter Vulnerability Allows Hacker to Delete Credit Cards from Any Twitter Account

Just a month before micro blogging site Twitter have started its bug bounty program, a program that have helped many firm, organisation in related…

SQL Injection flaw on Yahoo escalated to Remote Code Execution

A critical web application vulnerability 'SQL injection' impact one of the domains of Yahoo Inc., which leads the attacker to gain the dat…

A Year Old Vulnerability in Facebook Still Unpatched

A security flaw in Facebook which was earlier reported under the Facebook bug bounty program is still resides and attacker can still perform the v…

Critical Vulnerability: Buy Any Product on eBay in just 0.01 USD

Another researcher from India name as " Ishwar Prasad Bhat " have discover the critical vulnerability on the Indian eBay website (www.eb…

GiveWP WordPress Plugin Vulnerability Impacts 100k+ WordPress Sites

A critical security vulnerability has been discovered in the popular WordPress plugin GiveWP, potentially putting over 100,000 websites at risk. The …

Single RCE Vulnerability affects Yahoo, Microsoft and Orange

Today  one of the security researcher have bypass the security of the number of tech firm with a single vulnerability. A researcher named as Ebr…

Intel 12th Gen Alder Lake CPU Source Code Leaked Online

Update 10th October: Intel Confirms the authenticity of  Alder Lake leaked source code An anonymous individual released the source code of Intel Alde…

Vulnerability in Facebook allows Hacker to Delete any Photo Album

A critical vulnerability on Facebook has been discovered by the security researcher which allow him to delete anyone's complete photo album an…

Google paying even more for the Security Vulnerability

As we all know that there are some companies which gives rewards for reporting a unique vulnerability on there site or on products. By these secur…