{"id":27208,"date":"2019-05-27T16:49:21","date_gmt":"2019-05-27T16:49:21","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30188\/The-Ethical-Hackers-Taking-The-Bugs-To-The-Bank.html"},"modified":"2019-05-27T16:49:21","modified_gmt":"2019-05-27T16:49:21","slug":"the-ethical-hackers-taking-the-bugs-to-the-bank","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/","title":{"rendered":"The Ethical Hackers Taking The Bugs To The Bank"},"content":{"rendered":"<figure class=\"media-with-caption\" readability=\"-24\">\n<div class=\"player-with-placeholder\" readability=\"7\"> <img decoding=\"async\" class=\"media-placeholder player-with-placeholder__image lead-video-placeholder\" src=\"https:\/\/ichef.bbci.co.uk\/images\/ic\/720x405\/p072b24p.jpg\"><\/p>\n<p>Media playback is unsupported on your device<\/p>\n<\/p><\/div><figcaption class=\"media-with-caption__caption\"><span class=\"off-screen\">Media caption<\/span>WATCH: Argentinean teenager Santiago Lopez was one of the first to make $1m from bug bounties<\/figcaption><\/figure>\n<p class=\"story-body__introduction\">These days, when an unexpected email turns up offering lots of cash, most people just assume it is a scam and delete it. <\/p>\n<p>But Mark Litchfield opened one such a message and it led him on a journey that, so far, has netted him about $1.5m (\u00a31.15m) &#8211; all of it legitimate. <\/p>\n<p>The email was from one-time web giant Yahoo, now owned by Verizon Media, and offered Mr Litchfield several thousand dollars as a reward for finding a bug in its website code.<\/p>\n<p>The email was a surprise because he had pretty much forgotten about finding the bug.<\/p>\n<p>&#8220;I submitted a bug to Yahoo and thought that was the end of it,&#8221; he told BBC News. &#8220;And then I got this email saying, &#8216;Hey, we&#8217;ve got some money for you. Do you want it?'&#8221;<\/p>\n<figure class=\"media-landscape has-caption full-width\"><span class=\"image-and-copyright-container\"> <span class=\"off-screen\">Image copyright<\/span> <span class=\"story-image-copyright\">Getty Images<\/span> <\/span><figcaption class=\"media-caption\"><span class=\"off-screen\">Image caption<\/span> <span class=\"media-caption__text\"> Yahoo had millions wiped off its value because it fell victim to several hack attacks <\/span> <\/figcaption><\/figure>\n<p>&#8220;That&#8217;s when I realised that there was money to be made in this.&#8221; <\/p>\n<p>Yahoo, like a growing number of large companies, pays up when people find loopholes in its web code that could be exploited by malicious hackers. <\/p>\n<p>Through bitter experience, Yahoo has learned what happens when bugs are missed. In 2013 and 2014, it suffered two massive breaches. Data on more than one billion users went astray.<\/p>\n<p>It stepped up its bug-hunting efforts in the wake of those breaches &#8211; which is where Mr Litchfield and others like him come in. <\/p>\n<p>Those ethical hackers sign up with companies such as Hacker One, Bug Crowd, Synack and others who run the bug bounty programmes on behalf of companies. <\/p>\n<p>And, according to Mr Litchfield, anyone can do it. <\/p>\n<p>&#8220;I can&#8217;t code &#8211; at all,&#8221; he said. &#8220;Yet I&#8217;ve managed to be extremely successful, so literally anyone could do this.&#8221;<\/p>\n<p>Well, maybe. <\/p>\n<figure class=\"media-landscape has-caption full-width\"><span class=\"image-and-copyright-container\"> <span class=\"off-screen\">Image copyright<\/span> <span class=\"story-image-copyright\">Getty Images<\/span> <\/span><figcaption class=\"media-caption\"><span class=\"off-screen\">Image caption<\/span> <span class=\"media-caption__text\"> Learning to spot bugs in working code can help hone computer skills <\/span> <\/figcaption><\/figure>\n<p>Mr Litchfield may not code but he has other technical skills. He turned to bug hunting after years of working in the security industry, where he became an expert on the protocols that govern how computers swap data.<\/p>\n<p>Finding bugs in the way data is transported has netted him the bumper payouts. <\/p>\n<h2 class=\"story-body__crosshead\">Catching the bug<\/h2>\n<p>For anyone looking to blaze a similar million-dollar trail or even just start a career in cyber-security, knowing that Mr Litchfield has decades of experience to call on can be disheartening.<\/p>\n<p>It was a feeling familiar to anyone looking to break into the security industry, said James Lyne, head of research at the Sans Institute.<\/p>\n<p>The gap between the experts and the beginners could seem too vast to cross, he said. <\/p>\n<p>For a long time, it had been only those lucky enough to discover a real affinity for cyber-security work, who persevered and would hunt for bugs even if they were not getting paid to do it, who found a place in the industry, he said.<\/p>\n<p>That was Mr Lyne&#8217;s experience and is one common among the pros, many of whom have an &#8220;origin&#8221; story of how they accidentally, or with the help of a mentor, made it. <\/p>\n<p>&#8220;I was one of the people that lucked out and learned in the industry,&#8221; he said.<\/p>\n<p>There was a growing need for that haphazard selection process to change, said Mr Lyne, given the massive skill shortage in the cyber-security industry. <\/p>\n<p>&#8220;You need to find a way for someone who does not know they love it to connect with it,&#8221; he said.<\/p>\n<p>Many governments, including the UK&#8217;s, have set up educational schemes that try to give schoolchildren a taste of cyber-security to see if they like it.<\/p>\n<p>Mr Lyne helped create the UK&#8217;s scheme, Cyber Discovery, which in its first year had more than 25,000 school children take part.<\/p>\n<figure class=\"media-landscape has-caption full-width\"><span class=\"image-and-copyright-container\"> <span class=\"off-screen\">Image copyright<\/span> <span class=\"story-image-copyright\">Cyber-Discovery<\/span> <\/span><figcaption class=\"media-caption\"><span class=\"off-screen\">Image caption<\/span> <span class=\"media-caption__text\"> The cartoonish appearance puts a friendlier face on tricky cyber-security skills <\/span> <\/figcaption><\/figure>\n<p>&#8220;It&#8217;s a teaching tool and a sorting hat,&#8221; said Mr Lyne. <\/p>\n<p>The Cyber Discovery programme &#8220;gamifies&#8221; the day-to-day work of the pros.<\/p>\n<p>It turns finding security loopholes, tracking hackers, analysing documents for clues and other basic skills into engaging games. <\/p>\n<p>It also gets children familiar with the tools many cyber-pros use day-to-day.<\/p>\n<p>Participants get points when they complete a section. And the top performers get to attend residential courses that help them hone their skills further. <\/p>\n<p>Bug bounties, said Mr Lyne, were another way that keen amateurs could take their first steps into a cyber-career. <\/p>\n<p>&#8220;It&#8217;s an easier in to the industry and a way to prove your skills,&#8221; he said.<\/p>\n<h2 class=\"story-body__crosshead\">Bigger bugs<\/h2>\n<p>Ian Glover, head of the Crest organisation, which certifies the skills of ethical security testers in the UK, is a supporter of bug bounties too &#8211; again as a way for people to get a glimpse of what it is like to defend networks and defeat bad guys for a living. <\/p>\n<p>&#8220;The money side of it is not as much of a motivation as you might imagine,&#8221; he told BBC News &#8211; while a few people made a lot of money, most did not. <\/p>\n<p>&#8220;It&#8217;s more about trying to solve the challenges, getting into the industry and getting recognition by your peers.&#8221; <\/p>\n<p>But anyone taking part in a bug bounty hunt should realise the job of a cyber-security worker demanded far more in terms of skill and expertise,&#8221; Mr Glover said.<\/p>\n<p>And companies should have a whole host of other well administered defences in place long before they think about letting bounty hunters have a sniff.<\/p>\n<p>Alongside defences embedded in networks and threat-analysis teams should go exercises such as penetration tests that do a more in-depth job of ensuring a system is broadly proof against attack.<\/p>\n<p>&#8220;Bounties should be the end of the process, not the beginning,&#8221; Mr Glover said.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30188\/The-Ethical-Hackers-Taking-The-Bugs-To-The-Bank.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27209,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[140],"class_list":["post-27208","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehacker"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Ethical Hackers Taking The Bugs To The Bank 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Ethical Hackers Taking The Bugs To The Bank 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-27T16:49:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/the-ethical-hackers-taking-the-bugs-to-the-bank.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"405\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-ethical-hackers-taking-the-bugs-to-the-bank\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-ethical-hackers-taking-the-bugs-to-the-bank\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The Ethical Hackers Taking The Bugs To The Bank\",\"datePublished\":\"2019-05-27T16:49:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-ethical-hackers-taking-the-bugs-to-the-bank\\\/\"},\"wordCount\":1006,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-ethical-hackers-taking-the-bugs-to-the-bank\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/the-ethical-hackers-taking-the-bugs-to-the-bank.jpg\",\"keywords\":[\"headline,hacker\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-ethical-hackers-taking-the-bugs-to-the-bank\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-ethical-hackers-taking-the-bugs-to-the-bank\\\/\",\"name\":\"The Ethical Hackers Taking The Bugs To The Bank 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-ethical-hackers-taking-the-bugs-to-the-bank\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-ethical-hackers-taking-the-bugs-to-the-bank\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/the-ethical-hackers-taking-the-bugs-to-the-bank.jpg\",\"datePublished\":\"2019-05-27T16:49:21+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-ethical-hackers-taking-the-bugs-to-the-bank\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-ethical-hackers-taking-the-bugs-to-the-bank\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-ethical-hackers-taking-the-bugs-to-the-bank\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/the-ethical-hackers-taking-the-bugs-to-the-bank.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/the-ethical-hackers-taking-the-bugs-to-the-bank.jpg\",\"width\":720,\"height\":405},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-ethical-hackers-taking-the-bugs-to-the-bank\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehacker\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Ethical Hackers Taking The Bugs To The Bank\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Ethical Hackers Taking The Bugs To The Bank 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/","og_locale":"en_US","og_type":"article","og_title":"The Ethical Hackers Taking The Bugs To The Bank 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-05-27T16:49:21+00:00","og_image":[{"width":720,"height":405,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/the-ethical-hackers-taking-the-bugs-to-the-bank.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The Ethical Hackers Taking The Bugs To The Bank","datePublished":"2019-05-27T16:49:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/"},"wordCount":1006,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/the-ethical-hackers-taking-the-bugs-to-the-bank.jpg","keywords":["headline,hacker"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/","url":"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/","name":"The Ethical Hackers Taking The Bugs To The Bank 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/the-ethical-hackers-taking-the-bugs-to-the-bank.jpg","datePublished":"2019-05-27T16:49:21+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/the-ethical-hackers-taking-the-bugs-to-the-bank.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/the-ethical-hackers-taking-the-bugs-to-the-bank.jpg","width":720,"height":405},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-ethical-hackers-taking-the-bugs-to-the-bank\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehacker\/"},{"@type":"ListItem","position":3,"name":"The Ethical Hackers Taking The Bugs To The Bank"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27208"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27208\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27209"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}