Tagged articles
8 articles
Page 1 of 1
DevOps Coach
DevOps Coach
Apr 21, 2026 · Industry Insights

What Space Shuttle Software and TeX Teach Us About Zero‑Bug Development

This article compares the ultra‑reliable software process behind the Space Shuttle with Donald Knuth’s painstaking development of TeX, highlighting extreme documentation, version‑controlled bug tracking, a zero‑bug release philosophy, and how scarcity‑driven constraints can forge lasting software excellence.

Bug BountyTeXVersion Control
0 likes · 10 min read
What Space Shuttle Software and TeX Teach Us About Zero‑Bug Development
Programmer DD
Programmer DD
Apr 12, 2023 · Information Security

OpenAI Launches $20K Bug Bounty: How Researchers Can Secure AI

OpenAI announced a new Bug Bounty Program offering up to $20,000 for verified vulnerabilities, inviting global security researchers to help secure its AI models while outlining clear rules, out‑of‑scope exclusions, and a partnership with Bugcrowd for reward management.

AI securityBug BountyBugcrowd
0 likes · 7 min read
OpenAI Launches $20K Bug Bounty: How Researchers Can Secure AI
21CTO
21CTO
Aug 6, 2022 · Information Security

How Twitter Fixed a Critical Bug and Stopped a 5.4M‑Account Data Leak

Twitter’s tech team patched a major security flaw that exposed email addresses and phone numbers of over 5.4 million accounts, prompting a $30,000 data sale on Breached Forums and a $5,040 bug‑bounty reward for the researcher who reported it.

Bug BountySecurity BreachTwitter
0 likes · 3 min read
How Twitter Fixed a Critical Bug and Stopped a 5.4M‑Account Data Leak
21CTO
21CTO
Feb 16, 2021 · Information Security

How Hackers Exploit Dependency Confusion to Hijack Packages and Earn Bounties

Security researcher Alex Birsan demonstrates how simple dependency‑confusion attacks—registering private package names on public registries like npm, PyPI, and RubyGems—can silently compromise internal build systems of major tech firms, yielding high‑value bug bounties while exposing systemic risks in package management.

Bug BountySupply Chaindependency confusion
0 likes · 14 min read
How Hackers Exploit Dependency Confusion to Hijack Packages and Earn Bounties
ITPUB
ITPUB
Feb 15, 2021 · Information Security

How Hackers Exploit Dependency Confusion to Breach Major Tech Companies

This article explains how simple yet powerful dependency‑confusion attacks let attackers upload malicious packages to public registries, exfiltrate data via DNS, and compromise internal systems of companies like PayPal, Shopify, Apple and others, highlighting the methodology, results, root causes and mitigation ideas.

Bug Bountydependency confusionnpm
0 likes · 13 min read
How Hackers Exploit Dependency Confusion to Breach Major Tech Companies
iQIYI Technical Product Team
iQIYI Technical Product Team
Dec 25, 2020 · Information Security

iQiyi Security Incident Response Center Vulnerability Handling Policy (Version 3.0)

iQiyi Security Incident Response Center Vulnerability Handling Policy version 3.0 outlines scope, principles, reporting process, severity scoring, reward system, user levels, dispute resolution, and prohibitions, emphasizing dedicated handling, point-based rewards, and strict rules for disclosures and malicious activity.

Bug BountyVulnerability Managementinformation security
0 likes · 13 min read
iQiyi Security Incident Response Center Vulnerability Handling Policy (Version 3.0)