vulnerability disclosure

Schneier - Cypto-Gram July 15, 2000

2000/07/15 : Bruce Schneier publishes his monthly crypto-gram, talking about the full disclosure CIA just faced and Counterpane Internet Security News, among other things.

This artifact is part of the ...Read more

iDEFENSE Labs Website Launch

2005/02/17 : iDEFENSE Labs announces the launch of their community site.

"This site will serve as our repository for sharing our research and development with the security community, including the release of free 
...Read more

Schneier - Crypto-Gram August 15, 1999

1999/08/15 : Here is the monthly newsletter written by Schneier on his blog. He speaks among other things about Back Orifice.

This artifact is part of the Back Orifice Bundle and the...Read more

Exploit Code on Trial (Poulsen paper)

2003/11/23 : "Security pros gathering at a Stanford University Law School conference on responsible vulnerability disclosure Saturday harmonized on the principle that vendors should be privately notified of holes in their products, and given at least some time to produce a patch before any...Read more

What a second flaw in Switzerland's sVote means for NSW's iVote (Pursuit article)

2019/03/25: Pursuit, University of Melbourne, article by Vanessa Teague. The article reacts to the new vulnerability report in the Swiss Post e-voting system and what it means for iVote in New South Wales.Read more

The Legitimate Vulnerability Market: Inside the Secretive World of 0-day Exploit Sales (Miller article)

2007/05/06 : Charlie Miller writes about the new "0-day market" and dive into two case studies of attempted sales of 0-day exploits.

Read more

A unified timeline of Efail PGP disclosure events

2018/05/16: Timeline of the Efail vulnerabilities disclosures to PGP vendors and usersRead more

Efail: What A Disclosure FAIL That Was! (RBS article)

2018/05/16: Article criticizing the handling of the EFAIL vulnerabilities disclosureRead more

Bug Bounty Programs Are Being Used to Buy Silence - Schneier Post

2020/04/03 : Bruce Schneier writes on the "Investigative report [by J.M. Porup] on how commercial bug-bounty programs like HackerOne, Bugcrowd, and SynAck are being used to silence researchers".

To read Porup report : ...Read more

Subscribe to vulnerability disclosure