From Bounty to Exploit: Observations About Cybercriminal Contests
Credit to Author: David Sancho| Date: Thu, 27 Oct 2022 00:00:00 +0000
From articles to hackathons, cybercriminals are resorting to crowdsourcing to find more ways to exploit systems. In this blog, we discuss our takeaways and summarize the results of these contests.
Read more