capturethebug.xyz Open in urlscan Pro
2606:4700::6812:442  Public Scan

URL: https://capturethebug.xyz/
Submission: On September 18 via manual from FR — Scanned from FR

Form analysis 0 forms found in the DOM

Text Content

Skip to content
 * Home
 * Programs
 * Researchers
 * About
 * Services
   * Bug Bounty
   * VDP
   * PTAAS
 * Contact

Menu
 * Home
 * Programs
 * Researchers
 * About
 * Services
   * Bug Bounty
   * VDP
   * PTAAS
 * Contact

Sign up
Log In
Sign up
 * Home
 * Programs
 * Researchers
 * About
 * Services
   * Bug Bounty
   * VDP
   * PTAAS
 * Contact

Menu
 * Home
 * Programs
 * Researchers
 * About
 * Services
   * Bug Bounty
   * VDP
   * PTAAS
 * Contact




VULNERABILITY INTELLIGENCE PLATFORM

Real-time actionable security insights from a global community of 1000+ verified
security experts enabling the rapid discovery, prioritisation & remediation of
Cyber Security Vulnerabilities that exist in your organisation today.

Platform
Request a Demo




RAPIDLY DISCOVER, MONITOR & ELIMINATE CYBER VULNERABILITIES


AGILE SECURITY

Empower your agile development with our platform’s proactive vulnerability
identification and remediation tools.


COMMUNITY POWERED

Our platform connects you to over 1000 skilled global security researchers,
proactively detecting & preventing exploits before they happen.


CONTINUOUS TESTING

Revolutionise your security testing with our platform. Get real-time, vetted bug
reports from top-tier global researchers within minutes & hours.


HIGH VELOCITY, INTELLIGENT & COMMUNITY-POWERED PENETRATION TESTING

Secure, scalable and economical to adopt, the CTB platform enables you to
harness the collective intelligence of a global community of 1000+ security
researchers and ethical hackers to identify, prioritise, and remediate security
vulnerabilities in your critical digital assets.

 * Bug Reports
   Outcome focussed cyber engagement that prioritises business results as
   opposed to time expended.

 * Skilled Talent
   Ethical hackers available NOW 24 hours a day to test your critical
   applications.

 * Remediation
   Verified and Validated bug submissions with rapid patch assistance for quick
   bug fixes.

 * Faster Pen testing
   Launch pen testing in minutes, set your scope, select your preferred expert,
   and receive bug reports.

Learn More


CAPTURE THE BUG'S SERVICES AVAILABLE TODAY

Bug Bounty Program
VDP
PTAAS


BUG BOUNTY PROGRAM


HARNESS THE POWER OF OUR EXPERT GLOBAL COMMUNITY OF SECURITY RESEARCHERS TO
PROACTIVELY IDENTIFY AND ADDRESS HIDDEN CRITICAL VULNERABILITIES ON YOUR
PUBLIC-FACING ASSETS. OUR PLATFORM INCENTIVIZES RESEARCHERS WITH BOUNTIES,
ENSURING YOU RECEIVE CONTINUOUS TESTING AND PROTECTION.

 * Find vulnerabilities before they can be exploited
 * Incentivize ethical hackers to report vulnerabilities
 * Provides continuous testing and improve vulnerability management

Book A Demo


VDP – VULNERABILITY DISCLOSURE PROGRAM


OUR PLATFORM PROVIDES A SECURE CHANNEL FOR BOUNTY HUNTERS TO REPORT THEIR
SECURITY FINDINGS DIRECTLY TO YOU, HELPING YOU STAY AHEAD OF POTENTIAL THREATS
AND PROTECT YOUR SYSTEMS FROM MALICIOUS ACTORS. BY IMPLEMENTING A VDP, YOUS CAN
DEMONSTRATE YOUR COMMITMENT TO SECURITY AND TRANSPARENCY.

 * Early detection and mitigation of vulnerabilities
 * Improved reputation and trust with customers and stakeholders
 * Compliance with industry regulations, including ISO 29147.

Book A Demo


EARLY DETECTION AND MITIGATION OF VULNERABILITIES


WITH OUR VULNERABILITY INTELLIGENCE PLATFORM, BUSINESSES CAN ACCESS GLOBAL
COMMUNITY OF SKILLED SECURITY RESEARCHERS TO PERFORM A PENTEST TAILORED TO THEIR
SPECIFIC NEEDS. THIS IS A FASTER, SMARTER, COMMUNITY POWERED AND AGILE WAY OF
DOING PENETRATION TESTING.

 * Customized pentesting to meet business needs
 * Complies with industry regulations for security standards
 * Enables proactive identification of vulnerabilities

Read More


WHAT IS A VULNERABILITY INTELLIGENCE PLATFORM?

CTB’s Community-powered Vulnerability Intelligence Platform delivers modern and
frictionless vulnerability disclosure, penetration testing and bug bounty
services that provides organisations like yours a more cost efficient and
targeted approach to cyber security as part of multi-layered strategy.

We deliver real-time threat intelligence and value based pricing, scalability,
agility, faster vulnerability identification, and customisation to meet your
unique needs. With access to a community of 1000+ skilled security
professionals, you will identify and address potential security risks quickly
and stay ahead of emerging threats.


ARE YOU A SECURITY RESEARCHER?


BE A PART OF OUR BUG BUSTER COMMUNITY

Our vibrant and diverse global community of over 1000 security researchers &
ethical hackers possess the knowledge and expertise required to test for a wide
range of vulnerabilities in any application. We foster knowledge sharing and are
actively working to grow the pool of security researchers across the globe.

Register


Capture The Bug security researchers who perform security testing
uses a variety of methodologies including the following




WHY CAPTURE THE BUG?

CTB’s gives access to 1000+ verified global security experts who detect &
respond to critical vulnerabilities – well beyond traditional and automated
toolchains.


24/7 PROTECTION

Leverage thousands of researchers to continuously find vulnerabilities in your
product with CTB’s Bug Bounty program, integrated into your Software Development
lifecycle.


RESPONSIBLE DISCLOSURE

Our CTB platform provides a proven framework for responsible vulnerability
reporting and builds positive relationships with ethical hackers. A great place
to start your cyber security partnership with us.


WHAT OUR CLIENTS SAY ABOUT US

"We've spent 5o years building our reputation. We don’t want to be the next
cyber victim in the paper. The CTB platform means lighting it up for our firm
was self service which saves us a bunch of time and money while ensuring that
our systems and data is secure."

Daniel PeakeMcGregor's Farm Services
Aotearoa, NZ
CTB helped us with our company's security compliance needs. Their team of highly
skilled and professional security experts provided a quality service at a
reasonable price. We highly recommend their IT cyber security services!

Wesley Tuzza Senior Security and DevOps Engineer
Kademi.co
"I honestly think that the team behind CTB did a spectacular job and helped us
identify and secure the Centralized aspects of our Platform!"

Octavian LojnitaCEO of BTC Lottery
"Historically we’ve felt specialist cyber security consulting was a bridge too
far for our boutique law firm. However, CTB’s bug bounty programs and cool new
approach are a breath of fresh air. Best of all, we only ever pay when a
vulnerability is identified and verified."

Takena StirlingStirling Law
Aotearoa, NZ
"We've spent 5o years building our reputation. We don’t want to be the next
cyber victim in the paper. The CTB platform means lighting it up for our firm
was self service which saves us a bunch of time and money while ensuring that
our systems and data is secure."

Daniel PeakeMcGregor's Farm Services
Aotearoa, NZ
CTB helped us with our company's security compliance needs. Their team of highly
skilled and professional security experts provided a quality service at a
reasonable price. We highly recommend their IT cyber security services!

Wesley Tuzza Senior Security and DevOps Engineer
Kademi.co



FREQUENTLY ASKED QUESTION

What’s a bug bounty?

The bounty is the financial reward our security researchers get if they find a
verified bug or vulnerability in your site. In the private sector this approach
is leveraged all over the world by companies including Amazon, Google, Apple and
Paypal not to mention public sector local and central governments including
Australia, Switzerland and Europe. In 2016 The US Department of Defence
introduced “Hack the Pentagon”, which resulted in 138 vulnerabilities being
identified and resolved.

What if your hackers take advantage of any vulnerabilities they find?

Don’t worry: our ethical hackers are the good guys! But here at CTB we fully
understand that trust and confidence is key; therefore we operate on a zero
trust basis and stringently work to validate and verify all the security
researchers and ethical hacker community that wish to join the Capture the Bug
community to support our customers. Our ethical hackers will knock on any
“unlocked” doors, but they won’t enter. The clear and unwavering objective is to
find critical issues in your systems before they are exploited by the bad guys.

How can you tell your hackers are ethical?

All the security researchers in our team have been formally IDed so we know
exactly who they are. Our “hackers” are actually tech specialists with
incredible tech skills that they put to work in this way to challenge themselves
and make extra money, legally.

What happens if you find a bug or vulnerability?

You’ll get a full report on what the bug is so your in-house team can fix it. If
you need help addressing it, we can help you there, too.

Cyber criminals only target big business

Unfortunately when it comes to cyber crime no business is immune regardless of
size or scale. SME’s are targeted all the time – often it’s just the big
businesses that make the news. We know of businesses that have had their
websites hacked and taken over, internal quote systems shut down meaning they
can’t do business, and customer data stolen. Everyone is a target; security
providers detected more than 169,000 threats to New Zealand since the middle of
last year. Cyber criminals are relentless. Harness the expertise of our hacking
community with our next-gen Intelligent Penetration testing. Our cost-efficient
and scalable ‘Penetration Testing as a Service’ model ensures expert skills are
at your fingertips, thanks to the Capture The Bugs ethical hacking community.

Can a white hat (ethical hacker) at some point could turn black hat (bad actor)?

We have not seen that happen. It could perhaps be argued that a zero-day
vulnerability or an exploit is worth so much in the black market that a security
researcher could be tempted into selling it there rather than getting a bounty
from the owner of the system or product. But for some reason, that is not how
bug hunters act.

The main reason is that the skill to find zero-days only comes over several
years, and once you have several years of experience, you also have a
professional profile that’s tied to your past accomplishments. You have earned a
reputation in the infosec community, that it does not make sense to risk it all.

What's stopping ethical hackers from going rogue?

Ethical hackers abide by a standard of ethics and morals but are also Id
verified before being hired.

Background checks are carried out and documents such as Disclosure policy and
confidentiality agreements are signed.

In addition to that, there are the Rules of Engagement,

“It’s a document that expressly outlines what the limits are for the ethical
hacker. helping them to provide a strict boundary about what they are allowed to
do, and what systems they’re allowed to target.


KEEN TO LEARN MORE & START WORKING WITH US?

Book a Demo
 * New Zealand - Waikato, Hamilton
 * +64 (03) 394 0821

Twitter Linkedin


CAPTURE THE BUG

 * About Us
 * Blog


COMPANY

 * Request Demo
 * How it works
 * Public Programs New
 * Pricing


USEFUL LINKS

 * Code of Ethics
 * Customer Terms & Conditions
 * Disclosure Policy
 * Privacy Policy
 * Researcher Terms & Conditions
 * CTB Terms & Conditions
 * Trust Center


C COPYRIGHT 2023 COMPANY. ALL RIGHTS RESERVED.


MADE WITH ❤️ IN NEW ZEALAND