fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

9.8K
active users

#bugbounty

24 posts17 participants1 post today
Efani<p>💰 Microsoft is offering up to $30,000 for AI vulnerabilities — and they’re not just talking bugs in code, but flaws in model behavior itself.</p><p>As part of its expanding bug bounty program, Microsoft is now rewarding security researchers who uncover critical AI vulnerabilities in its enterprise tools — including Dynamics 365, Power Platform, PowerApps, and Microsoft Copilot Studio.</p><p>Here’s what qualifies:<br>- Prompt Injection: Attacks where malicious prompts trigger unintended outputs <br>- Input Perturbation: Small input tweaks that trick models into making wrong predictions <br>- Model Poisoning: Manipulating model architecture or training data <br>- Inferential Disclosure: Exposing sensitive training data, model structure, or stealing the model itself </p><p>Top bounties (up to $30,000) are reserved for:<br>- Critical vulnerabilities that require no user interaction <br>- High-quality reports with reproduction steps <br>- Weaknesses that allow data exfiltration or privilege escalation</p><p>Researchers can test on free Microsoft trials and use official documentation to get started. Even if a submission doesn’t qualify for a cash reward, Microsoft says researchers will be recognized if their work improves AI security.</p><p>This new program is powered by Microsoft’s AI Vulnerability Severity Classification Framework — a structured approach to evaluating the security impact of prompt injection, data leakage, model evasion, and more.</p><p>As enterprise AI adoption accelerates, so do the risks. And Microsoft’s move is a clear sign: AI security is no longer experimental — it’s operational.</p><p>At Efani, we believe bug bounty programs like these are critical. In the age of AI, the attack surface isn’t just the software — it’s the behavior of the models themselves.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/MicrosoftAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MicrosoftAI</span></a></p>
Alonso Caballero / ReYDeS🥇 Webinar Gratuito: "Filtros para Captura con TcpDump" ⏲️ Jueves 1 de Mayo del 2025. De 4:00pm a 4:45pm (UTC -05:00) 🎓 Registro libre en: https://www.reydes.com/e/eventos #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Scopify is a Python-based recon tool for pentesters, leveraging `netify.ai` to analyze CDNs, hosting, and SaaS infra of target companies. Optional OpenAI integration adds AI-guided insights for deeper testing. Built by <span class="h-card" translate="no"><a href="https://infosec.exchange/@Jhaddix" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Jhaddix</span></a></span> &amp; Arcanum-Sec. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/Arcanum-Sec/Scopify" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/Arcanum-Sec/Scopify</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Alonso Caballero / ReYDeS📌 Tipos de Evidencia: Logs 💡 https://www.reydes.com/e/Tipos_de_Evidencia_Logs #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Discernible<p>🪲 During this week's Discernible Drill on bug bounty communications, we explored how powerful it is to give the benefit of the doubt, regardless of whether you receive it first. Information asymmetry between researchers and security teams creates natural friction, but documentation and good-faith communication can transform outcomes.</p><p>Despite high-profile negative examples, most organizations want to handle vulnerabilities properly &amp; researchers who approach them with professionalism achieve better results and build a stronger reputation for themselves.</p><p>Full post: <a href="https://discernibleinc.com/blog/breaking-down-barriers-insights-bug-bounty-communications-drill" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discernibleinc.com/blog/breaki</span><span class="invisible">ng-down-barriers-insights-bug-bounty-communications-drill</span></a></p><p><a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/SecurityComms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityComms</span></a></p>
Pyrzout :vm:<p>Microsoft Offers $30,000 Bounties for AI Security Flaws <a href="https://gbhackers.com/microsoft-offers-30000-bounties/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gbhackers.com/microsoft-offers</span><span class="invisible">-30000-bounties/</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://social.skynetcloud.site/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.skynetcloud.site/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a></p>
Alonso Caballero / ReYDeS🎓 Curso Forense Redes 2025 🗓️ Domingos 4, 11, 18 y 25 de Mayo 🕘 De 9:00 am a 12:00 pm (UTC -05:00) 🌐 Información: https://www.reydes.com/e/Curso_Forense_de_Redes #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Alonso Caballero / ReYDeS📌 Formato de Archivo para Captura PCAP 💡 https://www.reydes.com/e/Formato_de_Archivo_para_Captura_PCAP #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Alonso Caballero / ReYDeS🎓 Curso Forense Redes 2025. 🗓️ Domingos 4, 11, 18 y 25 de Mayo 🕘 De 9:00 am a 12:00 pm (UTC -05:00) 🔖 Información (PDF): https://www.reydes.com/archivos/cursos/Curso_Forense_Redes.pdf #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Alonso Caballero / ReYDeS🆓 Webinar Gratuito: "Filtros para Captura con TcpDump". ⚡️ Jueves 1 de Mayo del 2025. De 4:00pm a 4:45pm (UTC -05:00). 👾 Registro libre en: https://www.reydes.com/e/eventos #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Alonso Caballero / ReYDeS📌 ¿Dónde Empezar en una Investigación Forense? 💡 https://www.reydes.com/e/Donde_Empezar_en_una_Investigacion_Forense #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Discernible<p>🪲 New Security Communication Drill: The Bug Bounty Researcher's Perspective</p><p>Join us tomorrow for an interactive security communication drill that flips the script on traditional security exercises. Instead of focusing on the vendor side, we'll put participants in the shoes of security researchers navigating the challenges of vulnerability disclosure.</p><p>This hands-on scenario will challenge you to:</p><p>🐛 Navigate security assessments with limited visibility into internal architectures</p><p>🐞 Build credibility when you have less system context than internal teams</p><p>🐛 Communicate effectively through multi-layered teams (triage vendors vs. security engineers)</p><p>🐞 Balance respect for internal expertise while confidently advocating for your findings</p><p> 🐛 Manage disclosure expectations under tight time constraints</p><p>🐞 Push for security improvements without full visibility into compensating controls</p><p>Whether you're a security researcher, bug bounty program manager, or security engineer, this drill offers valuable insights into improving communications in the vulnerability disclosure process from both sides.</p><p>🗓️ Date: Wednesday, April 23 <br>🕰️ Time: 12pm ET <br>🗺️ Location: Discernible Drills Slack </p><p>🔥 Subscribe to Join: DiscernibleInc.com/drills</p><p><a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/SecurityCommunications" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityCommunications</span></a></p>
Alonso Caballero / ReYDeS🎓 Curso Forense Redes 2025. 🗓️ Domingos 4, 11, 18 y 25 de Mayo. 🕘 De 9:00 am a 12:00 pm (UTC -05:00). 🔍 Información: https://www.reydes.com/e/Curso_Forense_de_Redes #cybersecurity #hacking #readteam #bugbounty #forensics #osint
Habr<p>[Перевод] Превышение привилегий через манипуляцию с атрибутами аккаунта</p><p>Сегодня мы увидим, как параметры могут привести к большим финансовым потерям для компании. Давайте начнем с аккаунтом обычного пользователя на сайте, который представляет собой платформу электронной коммерции, где происходит покупка и продажа товаров. Допустим, сайт называется Example.com . Когда вы переходите в раздел покупки товаров и добавляете несколько позиций в корзину, вы видете примерно следующее...</p><p><a href="https://habr.com/ru/articles/902898/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">habr.com/ru/articles/902898/</span><span class="invisible"></span></a></p><p><a href="https://zhub.link/tags/%D0%B1%D0%B0%D0%B3%D0%B1%D0%B0%D1%83%D0%BD%D1%82%D0%B8" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>багбаунти</span></a> <a href="https://zhub.link/tags/%D0%B1%D0%B0%D0%B3%D1%85%D0%B0%D0%BD%D1%82%D0%B8%D0%BD%D0%B3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>багхантинг</span></a> <a href="https://zhub.link/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> <a href="https://zhub.link/tags/%D0%BF%D0%B5%D0%BD%D1%82%D0%B5%D1%81%D1%82" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>пентест</span></a> <a href="https://zhub.link/tags/%D0%BF%D0%B5%D0%BD%D1%82%D0%B5%D1%81%D1%82%D0%B8%D0%BD%D0%B3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>пентестинг</span></a> <a href="https://zhub.link/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a></p>
Finalizamos la tercera sesión del Curso OSINT - Open Source Intelligence 2025. Información: https://www.reydes.com/e/Curso_de_OSINT Información (PDF): https://www.reydes.com/archivos/cursos/Curso_OSINT_Open_Source_Intelligence.pdf ¡Gracias a todos los participantes! #cybersecurity #hacking #readteam #bugbounty #forensics #osint

SQL Injection (SQLi) 💉 – Everything You Need to Know

What is SQL Injection?
SQL Injection is a code injection technique that allows attackers to interfere with the queries an application makes to its database.

Types of SQLi:

1. In-band SQLi – Most common and easy to exploit.

2. Blind SQLi – Data isn’t visibly returned but can still be extracted through inference.

3. Out-of-band SQLi – Uses external servers to get results (less common but powerful).

4. Time-Based Blind SQLi – Server delay used to infer info from the database.

Attack Scenarios:
▫️Bypassing logins
▫️Dumping database contents
▫️Modifying or deleting data
▫️Escalating privileges
▫️Accessing admin panels

Common SQLi Targets:
🔹Login forms
🔹Search boxes
🔹URL parameters
🔹Cookies
🔹Contact or feedback forms

How to Prevent SQLi:
▪️Use parameterized queries
▪️Employ ORM frameworks
▪️Sanitize all user inputs
▪️Set least privilege for DB users
▪️Use Web Application Firewalls (WAF)

♦️Red Team Tip
Test all user input points, especially where data touches the database. Think beyond login forms—SQLi hides in unexpected places.

🔖Hashtags:
#SQLInjection #CyberSecurity #EthicalHacking #InfoSec #WebSecurity #RedTeam #BugBounty #Pentesting

⚠️Disclaimer:
This content is for educational purposes only. Always perform security testing with explicit permission. Unauthorized testing is illegal and unethical.