vulnerability disclosure

Three iOS 0-days revealed by researcher frustrated with Apple’s bug bounty

2021/09/24 (in ArsTechnica) : Ethical hackers are fed up with the inefficiency of Apple's bug bounty program. This is how three iOS 0-days were revealed by researcher frustrated. Jim Salter explains the situation.

This artifact is part of the ...Read more

The 2021 Hacker Report (HackerOne)

2021/03/08 : Here is the survey and statistics of the ethical hacker community for the year of 2021.

This artifact is part of the HackerOne Reports and Guidelines Bundle.Read more

Schneier - Cypto-Gram July 15, 2000

2000/07/15 : Bruce Schneier publishes his monthly crypto-gram, talking about the full disclosure CIA just faced and Counterpane Internet Security News, among other things.

This artifact is part of the ...Read more

NIAC VULNERABILITY DISCLOSURE FRAMEWORK

2004/01/13 : The National Infrastructure Advisory Concil published in January 2004 their Final report and recommendations on vulnerability disclosure.

"The NIAC reached consensus that the nation’s interests are advanced by a commitment by all stakeholders in...Read more

Black Hat 2000 - Ranum and Granick VS Rausch and Amhed

April 2000, at the Black Hat Conference (Singapour) took place a debate with Ranum and Granick against Rausch and Amhed.Read more
How not to prove your election outcome (SwissPost voting system 2nd vuln reporte)

2019/03/25: Public vulnerability report in the SwissPost e-voting system. Explanation and proof of the vulnerability. This is the second report showing vulnerabilities in this e-voting system by the security researchers team of Sarah Jamie Lewis, Vanessa Teague, and Olivier Pereira.

...Read more

Security Through Obscurity Considered Dangerous - Bellovin and Bush

2002/02/28 : Steven M. Bellovin and Randy Bush shows the utility of obscurity and open discussions on vulnerabilities. Read more

Emerging Economic Models for Vulnerability Research (Nagle and Sutton paper)

2006 : "The purpose of this paper is to look at economic vulnerability models that exist in the market today and analyze how they affect vendors, end users and vulnerability researchers." (Nagle and Sutton, p.2)Read more

Ranum Keynote Slides (Black Hat Conference 2000)

2000/07/26 : Here are the slides of Ranum keynote at the US Black Hat conference.

Between 1999 and the mid 2000s, Ranum developed his critique of full disclosure, and he presented it as the keynote speech of the US...Read more

Deconstructing the myths behind the full-disclosure debate (Heiser 2001)

2001/01 : Heiser gives his critique on full disclosure. 

"The concept of full disclosure is, indeed, ambiguous, serving as a
politically correct shield behind which all manner of self-serving behavior
can be justified." (p. 2)
Read more

Subscribe to vulnerability disclosure