Vulnerability Disclosure

Threat Intelligence is one of the more important fields in the cyber security domain. Knowing your adversaries enables you as an organization to be one step ahead before actual cyber-attacks takes place. It is important to remember that there are two types of internet – the internet that we all know and the dark web which is used for malicious and illicit purposes.

Vulnerability Disclosure

How It Works

One of the common challenges vendors face is the ability to adopt a crowdsourcing model of cyber-threat analysts that cover the entire world. BugBounty Threat Intelligence module provides multiple features and aims to solve many of the current challenges that exist within the current field of human-drive threat intelligence;

01

Crowdsourcing threat intelligence analysts to provide human-driven threat intelligence services, and work with existing threat intelligence vendors to provide enriched context of threats.

02

Ability to allow anonymous cyber-whistle blowing services. Every hacking group will have individuals that may be willing to disclose certain information for the great good.

03

Industry sector leaders can publish requirements for specific threat intelligence campaigns they may be concerned about impacting their industry for research purposes “the threat actors impacting the maritime industry as an example”.

04

BugBounty Threat Intelligence Module would work with well-known regulatory bodies such as (National and Regional CERT / SIRT teams Industry CERT / SIRT teams such as; ICS-CERT, FIRST Law Enforcement Agencies, Governments, CERTs)

Let’s get started