Video
You're Still Reading the Advisory. The Attacker Already Left.
Guest
Media Packet
959 items across 8 categories — press, stages, airwaves, and paperwork. Captured, displayed, and archived for posterity.
Video
Guest
Video
Podcasts
“Sponsored: What is Extended Identity Access Management?”
risky.biz
Podcasts
Podcasts
“Sponsored: AI Agents need distinct identities - Okta (Harish Peri)”
risky.biz
Podcasts
Podcasts
“Sponsored: The smouldering trashfire of AI and open source”
risky.biz
Podcasts
Host (sponsor interview)
Podcasts
“Sponsored: Filtering the KEV was really hard ... Until now!”
risky.biz
Podcasts
Host (sponsor interview)
Podcasts
“Sponsored: AI is critical to the future of cyber defence”
risky.biz
Podcasts
Host (sponsor interview)
Podcasts
Guest
Video
“ChatGPT's 2026 predictions with Casey Ellis”
youtube.com
Video
Guest
Podcasts
“Sponsored: ConsentFix and Push Security's browser attack taxonomy”
risky.biz
Podcasts
Host (sponsor interview)
Video
Co-host
Podcasts
“Beg Bounty: The New Wave of Unrequested Bug Claims”
redefiningcybersecuritypodcast.com
Podcasts
Guest
Podcasts
“Sponsored: Prowler uses AI how AI works best”
risky.biz
Podcasts
Host (sponsor interview)
Podcasts
“Sponsored: Sublime can save a s**t tonne of time”
risky.biz
Podcasts
Host (sponsor interview)
Video
Keynote speaker
Podcasts
Guest
Podcasts
“The State of Vulnerability Management”
reversinglabs.com
Podcasts
Guest
Podcasts
Guest
Podcasts
“Sponsored: The challenge of managing browser extensions”
risky.biz
Podcasts
Host (sponsor interview)
Podcasts
Guest
Podcasts
“Sponsored: Why prompt injection is an intractable problem”
risky.biz
Podcasts
Host (sponsor interview)
Podcasts
“Sponsored: Push Security on the evolution of phishing techniques”
risky.biz
Podcasts
Host (sponsor interview)
Podcasts
“Casey Ellis, Founder of BugCrowd: When Known Vulnerabilities are Life or Death”
decibel-podcast.simplecast.com
Podcasts
Guest
Podcasts
“Sponsored: Tines shines at solving interesting problems”
risky.biz
Podcasts
Host (sponsor interview)
Podcasts
Guest
Podcasts
“Sponsored: Nucleus Security on the evolution of vulnerability management”
risky.biz
Podcasts
Host (sponsor interview)
Podcasts
“Sponsored: Haroon Meer's secret to business success is... love”
risky.biz
Podcasts
Host (sponsor interview)
Video
“Towards Robust Third-Party Evaluation and Flaw Disclosure for General-Purpose AI”
icml.cc
Video
Panelist
Podcasts
“Ep 21: The role of AI in security measures with Casey Ellis”
boringappsec.com
Podcasts
Guest
Podcasts
“Sponsored: Should we ever trust AI?”
risky.biz
Podcasts
Guest
Podcasts
Guest
Video
Co-host
Podcasts
“Sponsored: Phishing crews have gotten really good at evasion”
risky.biz
Podcasts
Host (sponsor interview)
Podcasts
“Sponsored: HD Moore on why vuln scanners are awful and broken”
risky.biz
Podcasts
Host (sponsor interview)
Press & Media
“Lawsuit alleges Roblox tracks children's data without parental consent”
securitymagazine.com
Press & Media
Casey Ellis comments on a lawsuit against Roblox, framing it as a reminder of the "trust tax" companies pay when handling user data, particularly that of children. He notes the complexity of consent in digital environments and the potential for such lawsuits to set new precedents.
Press & Media
“CISA adds the notorious Telemessage flaw to KEV list”
csoonline.com
Press & Media
In response to CISA adding a Telemessage flaw to its KEV list, Casey Ellis analyzes the incident as a "classic case of supply chain risk." He emphasizes that trust in a vendor's security is paramount and that this breach demonstrates the cascading impact of a single vulnerability.
Podcasts
Guest
Press & Media
“What the Netflix ‘Zero Day’ series got right about incident response”
scworld.com
Press & Media
Casey Ellis provides commentary on the Netflix series 'Zero Day,' noting that it accurately portrays the intense, high-pressure environment of a major incident response and the complex coordination required between technical teams, leadership, and government agencies.
Press & Media
“Why Vulnerability Exploitation Is Shifting in 2024-25”
darkreading.com
Press & Media
In an article about shifting vulnerability exploitation trends, Casey Ellis argues that the advantage has recently swung back towards defenders, attributing this shift to the rise of bug bounty programs, improved vulnerability disclosure, and more proactive security postures from vendors.
Press & Media
“Bipartisan bill would renew cyber threat info sharing law”
ciodive.com
Press & Media
Commenting on the proposed renewal of the Cybersecurity Information Sharing Act (CISA), Casey Ellis emphasizes that the legislation is crucial for reinforcing the framework of public-private trust essential for national cybersecurity.
Press & Media
“What is Slopsquatting: A New Threat to AI-Generated Code Security”
hackread.com
Press & Media
Casey Ellis explains the concept of "slopsquatting," an attack that exploits the "fuzzy" and sometimes incorrect nature of AI-generated code. He notes that this emerging threat targets the trust developers place in AI tools and highlights the need for rigorous verification.
Press & Media
“Cybersecurity World On Edge As CVE Program Prepares To Go Dark”
forbes.com
Press & Media
In an article about the potential disruption of the Common Vulnerabilities and Exposures (CVE) program, Casey Ellis expresses his concern, describing the program as a "common language" for vulnerabilities that prevents chaos and enables coordinated defense.
Podcasts
Guest
Press & Media
“Malicious AI tool Xanthorox claims advanced capabilities for criminals, no jailbreaks required”
scworld.com
Press & Media
Casey Ellis discusses the emergence of Xanthorox, a malicious AI tool, highlighting the dual-use nature of AI. He explains that while AI democratizes technology, it also lowers the barrier for creating sophisticated cyberattacks.
Podcasts
Guest
Press & Media
“NSA: Fast-flux DNS evasion technique now a national security threat”
scworld.com
Press & Media
In response to an NSA advisory on "fast flux" DNS techniques, Casey Ellis explains that the method acts like a "shell game" to hide malicious servers and highlights the industrialization of cybercrime.
Press & Media
“Hack OpenAI And Win $100,000? What You Need To Know”
forbes.com
Press & Media
Casey Ellis comments on OpenAI's bug bounty program, framing it as a positive step that signals a commitment to security and transparency, which helps build trust with users and the security research community.
Press & Media
“Massive Surge In Ransomware Attacks, AI And 2FA Bypass To Blame”
forbes.com
Press & Media
Casey Ellis analyzes the surge in ransomware attacks, attributing it to threat actors using AI for more convincing phishing attacks and developing methods to bypass multi-factor authentication, urging for more robust defense strategies.
Video
Co-host
Papers
“In-House Evaluation Is Not Enough: Towards Robust Third-Party Flaw Disclosure for General-Purpose AI”
researchgate.net
Papers
Video
Guest
Podcasts
“Casey Ellis: Pioneering The Bug Bounty Platform”
creators.spotify.com
Podcasts
Guest
Video
“Security Flash: Salt Typhoon”
bugcrowd.com
Video
Co-host
Podcasts
“Crowdsourced Security & Vulnerability Disclosure with Casey Ellis”
delinea.com
Podcasts
Guest
Podcasts
“Security Breach: Casey Ellis”
mbtmag.com
Podcasts
Guest
Speaking Engagements
“(Not specified)”
Speaking Engagements
Video
“Strengthening AI Accountability Through Better Third Party Evaluations”
hai.stanford.edu
Video
Panelist
Video
Keynote speaker
Speaking Engagements
“Release The Hounds, Part 3 – History Repeating”
Speaking Engagements
Speaking Engagements
Video
Host (sponsor interview)
Podcasts
“Replay: Human vs. Super Suit: Exploring The AI-Human Relationship”
forcepoint.com
Podcasts
This podcast episode features Casey Ellis sharing insights on AI technology and cybersecurity, including the risks and rewards of AI, its role in the workplace, cyber defense, ethical considerations, and the disclose.io project.
Video
Guest
Podcasts
Panelist
Podcasts
“Outsmarting Adversaries: Using AI for Security”
govinfosecurity.com
Podcasts
Guest
Speaking Engagements
“Builders and Breakers: Partnering for Secure Elections”
rsaconference.com
Speaking Engagements
Speaking Engagements
“Builders and Breakers: Partnering for Secure Elections”
rsaconference.com
Speaking Engagements
Speaking Engagements
“Bugs on a Plane: Implementing a Bug Bounty in an Airline IT/OT Environment”
rsaconference.com
Speaking Engagements
Video
“San Francisco Moscone Center sees 40,000 people for RSA Conference”
cbsnews.com
Video
Guest
Video
“Dave Gerry And Casey Ellis On Tackling AI Bias”
expertinsights.com
Video
Guest
Podcasts
“5G Hackathons - Casey Ellis - BTS #28”
scworld.com
Podcasts
Guest
Video
Guest
Podcasts
Guest
Video
This interview explores the continuous evolution of maintaining and growing trust, educating those running bug bounty programs to set expectations, reward appropriately, and treat hackers with respect.
Podcasts
“The Adversarial Podcast - Casey Ellis appearance”
adversarial.com
Podcasts
Guest
Press & Media
“Critical Cisco SMB Router Flaw Allows Authentication Bypass, PoC Available Critical Cisco SMB Router Flaw Allows Authent…”
darkreading.com
Press & Media
Details a critical authentication bypass vulnerability in Cisco small-to-medium business routers, for which proof-of-concept exploit code is publicly available.
Video
In this podcast, Dave Gerry and Casey Ellis discuss the impact of AI on the cost of attack, how it broadens the pool of potential experts, and how it can be used to script or automate reconnaissance and lateral movement in cybersecurity.
Speaking Engagements
Speaking Engagements
Press & Media
“A Breach at LastPass Has Password Lessons for Us All”
nytimes.com
Press & Media
An article advising that despite recent breaches like the one at LastPass, using a password manager remains one of the best defenses against hackers.
Video
This interview highlights Bugcrowd's business model, which allows individuals without traditional access to roles and opportunities to earn meaningful income, emphasizing the rapid growth of the market and the ease with which customers can adopt their valuable solutions.
Press & Media
“Five Guys Data Breach Puts HR Data Under a Heat Lamp”
darkreading.com
Press & Media
Reports on a data breach at the restaurant chain Five Guys, which may have exposed sensitive human resources data.
Press & Media
“The U.S. Still Needs Cybersecurity Pros Despite All the Tech Layoffs”
news.clearancejobs.com
Press & Media
Argues that despite widespread layoffs in the tech sector, the demand for cybersecurity professionals in the U.S. remains high.
Press & Media
“How AI and DAST can mitigate security risks”
scmagazine.com
Press & Media
2023-01-27
Patents
“Automated Prediction Of Cybersecurity Vulnerabilities”
patents.justia.com
Patents
Techniques are disclosed for predicting cybersecurity vulnerabilities automatically in IT assets/targets based on known vulnerabilities of various available technologies/products. This is accomplished by loading and linking one or more ontologies in a graph database containing vulnerability information about the technologies. The assets/targets preferably belong to a bug-bounty program. An optional discovery tool maps the attack surface of each target. A profiler collects the various technologies or traits used by the target and links them to the target. Then the graph database is queried to predict the cybersecurity vulnerabilities associated with the traits and consequently with the targets. The system is preferably implemented with a service-oriented architecture (SOA) so feedback/predictions can be provided to the user in near/real-time.
Press & Media
“Cisco: No Fixes for Small Business Router Vulnerabilities”
channelfutures.com
Press & Media
Reports that Cisco will not be patching critical vulnerabilities in several end-of-life small business routers, advising customers to migrate to newer hardware.
Press & Media
“Cisco warns of two critical vulnerabilities in end-of-life routers”
teiss.co.uk
Press & Media
Covers Cisco's warning about two critical vulnerabilities in some of its end-of-life routers, for which no patches will be issued.
Projects
“Office of National Cyber Director (ONCD) Advisory Delegation”
whitehouse.gov
Projects
Advised on cybersecurity trends & secure by design
Video
This YouTube interview focuses on how Bugcrowd handles and processes feedback, with customers and researchers collaborating, contributing to successful bug bashes where people are intrigued and willing to get involved.
Press & Media
“Bugcrowd Recognized as Security Numbering Authority for Common Vulnerabilities and Exposures”
itnewsonline.com
Press & Media
A press release announcing that Bugcrowd has been designated as a CVE Numbering Authority (CNA) by the CVE Program.
Press & Media
“Bugcrowd Recognized as Security Numbering Authority for Common Vulnerabilities and Exposures”
finance.yahoo.com
Press & Media
Announces that Bugcrowd has been authorized as a CVE Numbering Authority (CNA), allowing it to assign CVE IDs to newly discovered vulnerabilities.
Press & Media
“15 Recent Consumer-Facing Tech Developments That Truly Excite Experts”
forbes.com
Press & Media
A piece where 15 technology experts, including Casey Ellis, share their excitement about recent consumer tech developments that they find truly innovative.
Press & Media
“SolarWinds data breach lawsuit takeaways for CISOs”
securitymagazine.com
Press & Media
Analyzes a shareholder lawsuit against SolarWinds following its major data breach, offering key lessons for CISOs on disclosure, liability, and supply chain security.
Press & Media
“Microsoft Takes Down Russia’s Strontium Allies Attacking Ukraine”
securityboulevard.com
Press & Media
Details Microsoft's actions to disrupt the Russian state-sponsored hacking group STRONTIUM (APT28) by taking control of domains used in attacks targeting Ukraine.
Press & Media
“The ‘Text4Shell’ vulnerability is not a sequel to Log4Shell”
scmagazine.com
Press & Media
An analysis piece clarifying that the "Text4Shell" vulnerability, while serious, does not have the same widespread impact or severity as the Log4Shell flaw.
Podcasts
“Season 01 Episode 07 - Bug Bounties with guest Casey Ellis”
rss.com
Podcasts
Guest
Press & Media
“Experts downplay reach of Apache bug ‘Text4Shell’”
therecord.media
Press & Media
Reports on security experts downplaying the potential impact of the "Text4Shell" vulnerability in an Apache Commons library, noting its limited real-world exploitability.
Press & Media
“CRITICAL-SEVERITY FLAW IN APACHE COMMONS TEXT LIBRARY FIXED”
duo.com
Press & Media
Details the patching of a critical severity remote code execution flaw, dubbed "Text4Shell," in the Apache Commons Text library.
Press & Media
“Former Uber Security Chief Convicted of Covering up Two Data Breaches”
cpomagazine.com
Press & Media
Details the conviction of former Uber CSO Joe Sullivan on charges of obstructing justice and concealing data breaches from federal authorities.
Press & Media
“It’s 2022 and netizens are only now getting serious about cybersecurity”
theregister.com
Press & Media
Argues that users often choose security and privacy tools based on hype and marketing rather than on their actual technical merits.
Press & Media
“Twisted Cyber Case Finds Former Uber Security Chief Guilty of Data Breach Coverup”
technewsworld.com
Press & Media
Reports on the guilty verdict for former Uber security chief Joe Sullivan, who was convicted of covering up a 2016 data breach.
Press & Media
“How Marico’s cybersec chief secured the board’s buy-in to amp up its security capabilities”
cio.economictimes.indiatimes.com
Press & Media
A case study on how the cybersecurity chief at the company Marico successfully gained board approval and investment to enhance their security capabilities.
Press & Media
“PSW #757 – EV KONTSEVOY, CASEY ELLIS”
scmagazine.com
Press & Media
An episode of the Paul's Security Weekly podcast featuring interviews with Ev Kontsevoy and Casey Ellis.
Press & Media
“FBI Helping Australian Authorities Investigate Massive Optus Data Breach: Reports”
darkreading.com
Press & Media
Reports that the FBI is assisting Australian authorities in the investigation of a massive data breach at the telecommunications company Optus.
Video
This podcast discusses the need for a scalable community to help with vulnerability disclosure, encouraging people to sign up, introduce themselves, and seek advice or connections for disclosing issues, emphasizing the progress of the disclose.io project.
Speaking Engagements
“SANS 2022 Top New Attacks and Threat Report”
Speaking Engagements
Press & Media
“NSW Gov picks CyRise to operate cyber accelerator”
crn.com.au
Press & Media
Reports that the New South Wales government has selected the accelerator CyRise to operate its new cybersecurity accelerator program.
Press & Media
“Researchers warn of ‘rosy’ security reports in wake of Twitter whistleblower case”
scmagazine.com
Press & Media
Discusses how the Twitter whistleblower case has led researchers to warn about the unreliability of overly positive internal security reports.
Press & Media
“Twitter lacks cybersecurity & data privacy best practices, says ex-security chief”
securitymagazine.com
Press & Media
Covers the explosive whistleblower complaint from former Twitter security chief Peiter "Mudge" Zatko, alleging severe cybersecurity and privacy deficiencies.
Press & Media
“Security Industry Rallies Behind Twitter Whistleblower”
securityboulevard.com
Press & Media
Reports on the cybersecurity industry's widespread support for Peiter "Mudge" Zatko, the Twitter whistleblower who alleged serious security failings at the company.
Press & Media
“Security Flash - Apple Vulnerability (CVE 2022-32893)”
bugcrowd.com
Press & Media
A webinar hosted by Bugcrowd discussing a zero-day vulnerability that was affecting multiple Apple products.
Press & Media
“Mudge Blows Whistle on Alleged Twitter Security Nightmare”
darkreading.com
Press & Media
Details the whistleblower complaint from Peiter "Mudge" Zatko, who described Twitter's security posture as a "nightmare" of mismanagement and negligence.
Press & Media
“Twitter has a security problem”
protocol.com
Press & Media
An article analyzing the security and business implications of the whistleblower complaint filed by Twitter's former head of security.
Press & Media
“ZERO DAY INITIATIVE CHANGES DISCLOSURE POLICY FOR FAULTY PATCHES”
duo.com
Press & Media
Reports on the Zero Day Initiative's change in policy regarding how it handles and discloses vulnerabilities for which vendors have issued faulty or incomplete patches.
Press & Media
“U.S. Doubles Reward for Information on North Korea Cyberattackers”
channelfutures.com
Press & Media
Reports that the U.S. government has doubled the reward, up to $10 million, for information on North Korean state-sponsored cyberattackers.
Press & Media
“Builders and Breakers”
securityboulevard.com
Press & Media
An opinion piece discussing the relationship between software developers ("builders") and security researchers ("breakers") and the need for better collaboration.
Press & Media
“Crypto Firms Make Thieving Hackers an Offer: Keep a Little, Give Back the Rest”
wsj.com
Press & Media
Reports on the growing trend of cryptocurrency firms negotiating with hackers after a theft, offering them a "bounty" to return the majority of the stolen funds.
Press & Media
“Latest Atlassian Confluence vulnerability raises concerns”
computerweekly.com
Press & Media
Discusses the security concerns raised by the discovery of the latest critical vulnerability in Atlassian's Confluence software.
Press & Media
“T-Mobile to Pay $350 Million Settlement in Data Breach Class-Action Lawsuit”
channelfutures.com
Press & Media
Reports that T-Mobile has agreed to pay $350 million to settle a class-action lawsuit related to a major data breach.
Press & Media
“Messaging Apps That Are Secure: Signal vs. WhatsApp”
thestreet.com
Press & Media
An article comparing the security and privacy features of different messaging apps, such as Signal and WhatsApp.