Close Menu
    Trending
    • How to Access NASA’s Climate Data — And How It’s Powering the Fight Against Climate Change Pt. 1
    • From Training to Drift Monitoring: End-to-End Fraud Detection in Python | by Aakash Chavan Ravindranath, Ph.D | Jul, 2025
    • Using Graph Databases to Model Patient Journeys and Clinical Relationships
    • Cuba’s Energy Crisis: A Systemic Breakdown
    • AI Startup TML From Ex-OpenAI Exec Mira Murati Pays $500,000
    • STOP Building Useless ML Projects – What Actually Works
    • Credit Risk Scoring for BNPL Customers at Bati Bank | by Sumeya sirmula | Jul, 2025
    • The New Career Crisis: AI Is Breaking the Entry-Level Path for Gen Z
    AIBS News
    • Home
    • Artificial Intelligence
    • Machine Learning
    • AI Technology
    • Data Science
    • More
      • Technology
      • Business
    AIBS News
    Home»Technology»What is bug hunting and why is it changing?
    Technology

    What is bug hunting and why is it changing?

    Team_AIBS NewsBy Team_AIBS NewsApril 29, 2025No Comments6 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Joe Fay

    Expertise Reporter

    Bugcrowd Two men work at a screen at Bugcrowd Bug Bash 2024Bugcrowd

    At occasions like Bugcrowd Bug Bash hackers compete to search out software program bugs

    Few expertise careers provide the possibility to show your abilities in unique venues worldwide, from luxurious motels to Las Vegas e-sports arenas, friends cheering you on as your title strikes up the leaderboard and your earnings rack up.

    However that is what Brandyn Murtagh skilled inside his first yr as a bug bounty hunter.

    Mr Murtagh bought into gaming and constructing computer systems at 10 or 11-years-old and all the time knew “I wished to be a hacker or work in safety”.

    He started working in a safety operations centre at 16, and moved into penetration testing at 20, a job that additionally concerned testing the safety of shoppers’ bodily and pc safety: “I needed to forge false identities and break into locations after which hack. Fairly enjoyable.”

    However prior to now yr he has grew to become a full-time bug hunter and impartial safety researcher, which means he scours organizations’ pc infrastructure for safety vulnerabilities. And he hasn’t seemed again.

    Web browser pioneer Netscape is thought to be the primary expertise firm to supply a money “bounty” to safety researchers or hackers for uncovering flaws or vulnerabilities in its merchandise, again within the Nineteen Nineties.

    Ultimately platforms like Bugcrowd and HackerOne within the US, and Intigriti in Europe, emerged to attach hackers and organizations that wished their software program and techniques examined for safety vulnerabilities.

    As Bugcrowd founder Casey Ellis explains, whereas hacking is a “morally agnostic talent set”, bug hunters do should function inside the legislation.

    Platforms like Bugcrowd carry extra self-discipline to the bug-hunting course of, permitting firms to set the “scope” of what techniques they need hackers to focus on. And so they function these stay hackathons the place high bug hunters compete and collaborate “hammering” techniques, displaying off their abilities and doubtlessly incomes massive cash.

    The payoff for firms utilizing platforms like Bugcrowd can also be clear. Andre Bastert, world product supervisor AXIS OS, at Swedish community digicam and surveillance tools agency Axis Communications, stated that with 24 million traces of code in its system working system, vulnerabilities are inevitable. “We realized it is all the time good to have a second set of eyes.”

    Platforms like Bugcrowd imply “you should use hackers as a drive for good,” he says. Since opening its bug bounty programme, Axis has uncovered – and patched – as many as 30 vulnerabilities, says Mr Bastert, together with one “we deem very extreme”. The hacker accountable obtained a $25,000 (£19,300) reward.

    Bugcrowd A group of participants at Bugcrowd's Bug Bash sit around a table.Bugcrowd

    The most effective bug hunters can earn greater than 1,000,000 kilos a yr

    So, it may be profitable work. Bugcrowd’s high incomes hacker over the past yr earned over $1.2m.

    However whereas there are hundreds of thousands of hackers registered on the important thing platforms, Inti De Ceukelaire, chief hacking officer at Intigriti, says the quantity looking on a each day or weekly foundation is “tens of hundreds.” The elite tier, who’re invited to the flagship stay occasions might be smaller nonetheless.

    Mr Murtagh says: “A great month would seem like a few essential vulnerabilities discovered, a few highs, a whole lot of mediums. Some good pay days in a perfect scenario.” However he provides, “It would not all the time occur.”

    But with the explosion of AI, bug hunters have complete new assault surfaces to discover.

    Mr Ellis says organizations are racing to achieve a aggressive benefit with the expertise. And this sometimes has a safety affect.

    “On the whole, if you happen to implement a brand new expertise rapidly and competitively, you are not considering as a lot about what would possibly go mistaken.” As well as, he says, AI is not only highly effective however “designed for use by anybody”.

    Dr Katie Paxton-Concern, a safety researcher and cybersecurity lecturer at Manchester Metropolitan College, factors out that AI is the primary expertise to blow up onto the scene with the formal bug looking neighborhood already in place.

    And it has levelled the taking part in subject for hackers, says Mr De Ceukelaire. Hackers – each moral and never – can exploit the expertise to hurry up and automate their very own operations. This ranges from conducting reconnaissance to establish weak techniques, to analysing code for flaws or suggesting doable passwords to interrupt into techniques.

    However trendy AI techniques’ reliance on massive language fashions additionally means language abilities and manipulation are an vital a part of the hacker software equipment, Mr De Ceukelaire says.

    He says he has drawn on traditional police interrogation methods to befuddle chatbots and get them to “crack”.

    Mr Murtagh describes utilizing such social engineering methods on chatbots for retailers: “I might try to make the chatbot trigger a request and even set off itself to present me one other consumer’s order or one other consumer’s knowledge.”

    Getty Images Chatbot on phone screenGetty Photographs

    Hackers attempt to trick AI powered chatbots

    However these techniques are additionally weak to extra “conventional” net app methods, he says. “I’ve had some success in an assault referred to as cross web site scripting, the place you’ll be able to primarily trick the chatbot into rendering a malicious payload that may trigger every kind of safety implications.”

    However the menace would not cease there. Dr Paxton-Concern says an over-focus on chatbots and enormous language fashions can distract from the broader interconnectedness of AI powered techniques.

    “Should you get a vulnerability in a single system, the place does that finally seem in each different system it connects to? The place are we seeing that hyperlink between them? That is the place I might be on the lookout for these sorts of flaws.”

    Dr Paxton-Concern provides that there hasn’t been a significant AI-related knowledge breach but, however “I feel it is only a matter of time”.

    Within the meantime, the burgeoning AI business must be positive it embraces bug hunters and safety researchers, she says. “The truth that some firms do not makes it a lot tougher for us to do our job of simply conserving the world secure.”

    That’s unlikely to place off the bug hunters within the meantime. As Mr De Ceukelaire says: “As soon as a hacker, all the time a hacker.”

    Extra Expertise of Enterprise



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleGoogle Uses DolphinGemma AI to Decode Dolphin Communication
    Next Article Supply chain : comment la donnée et le Machine Learning réinventent la logistique en Europe | by mindrush | Apr, 2025
    Team_AIBS News
    • Website

    Related Posts

    Technology

    Cuba’s Energy Crisis: A Systemic Breakdown

    July 1, 2025
    Technology

    Musk’s X appoints ‘king of virality’ in bid to boost growth

    July 1, 2025
    Technology

    Millions of websites to get ‘game-changing’ AI bot blocker

    July 1, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    How to Access NASA’s Climate Data — And How It’s Powering the Fight Against Climate Change Pt. 1

    July 1, 2025

    I Tried Buying a Car Through Amazon: Here Are the Pros, Cons

    December 10, 2024

    Amazon and eBay to pay ‘fair share’ for e-waste recycling

    December 10, 2024

    Artificial Intelligence Concerns & Predictions For 2025

    December 10, 2024

    Barbara Corcoran: Entrepreneurs Must ‘Embrace Change’

    December 10, 2024
    Categories
    • AI Technology
    • Artificial Intelligence
    • Business
    • Data Science
    • Machine Learning
    • Technology
    Most Popular

    6 Steps for Giving Employee Feedback That’s Actually Helpful

    April 24, 2025

    Why humanoid robots need their own safety rules

    June 11, 2025

    The First AI Movie Is Coming from Bollywood in 2025

    December 25, 2024
    Our Picks

    How to Access NASA’s Climate Data — And How It’s Powering the Fight Against Climate Change Pt. 1

    July 1, 2025

    From Training to Drift Monitoring: End-to-End Fraud Detection in Python | by Aakash Chavan Ravindranath, Ph.D | Jul, 2025

    July 1, 2025

    Using Graph Databases to Model Patient Journeys and Clinical Relationships

    July 1, 2025
    Categories
    • AI Technology
    • Artificial Intelligence
    • Business
    • Data Science
    • Machine Learning
    • Technology
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us
    Copyright © 2024 Aibsnews.comAll Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.