Vulnerabilities / Threats

12:30 PM
Dark Reading
Dark Reading
Products and Releases

Intercom Launches Bugcrowd Bug Bounty Program

Bugcrowd's curated crowd, simple-to-use platform and deep program expertise helps Intercom to secure customer data.

SAN FRANCISCO – February 16, 2017Intercom, the customer messaging platform, today launched a public bug bounty program with Bugcrowd, the leader in crowdsourced security testing. Building on the success of its private program, Intercom is now launching a public bug bounty program to leverage the full scope of Bugcrowd’s curated crowd of 50,000 cybersecurity researchers to help implement a secure development lifecycle and protect customer data.

Intercom’s public bug bounty program will issue monetary rewards of up to $1,500 per vulnerability identified, depending on impact and severity. The scope includes anything that relates to Intercom’s main application functionality and their iOS and Android SDKs. Intercom believes that the program is one of the best ways to address and stay on top of the latest cybersecurity challenges.

“Intercom's business relies on customer trust. To keep this trust we need to use the best tools available to keep our customers’ data secure,” said Thibault Candebat, Information Security Manager, Intercom. “Our private bug bounty program with Bugcrowd allowed us to tap into the creativity and abilities of hundreds of security researchers  to find and report the most complex bugs – the ones vulnerability scanners just can’t uncover. Now we’re expanding our program for access to a bigger pool of researchers to improve our ability to find and fix vulnerabilities.”

Bugcrowd connects organizations with a global network of tens of thousands of security researchers to identify vulnerabilities quicker and allow organizations to remediate issues before the adversaries can take advantage of them. Over the last four years, hundreds of organizations have harnessed Bugcrowd’s curated crowd, simple-to- use platform and deep program expertise to improve their security. By building this security expertise into the design, support and management of bug bounty programs, Bugcrowd ensures that organizations at all stages of security maturity realize real value from crowdsourced testing.

"Bug bounty adoption has taken off in the last year as it’s become clear that they are not only an asset to organizations, they are vital to the security of businesses," said Casey Ellis, CEO and founder of Bugcrowd. "Just as clear is the need for a trusted, experienced partner to ensure the success of these bounty programs. We are thrilled to partner with Intercom to help enable secure communications for their customers.”

To learn more about Intercom’s public bug bounty program or to participate, visit

About Bugcrowd, Inc.

The pioneer and innovator in crowdsourced security testing for the enterprise, Bugcrowd harnesses the power of more than 50,000 security researchers to surface critical software vulnerabilities and level the playing field in cybersecurity. Bugcrowd also provides a range of responsible disclosure and managed service options that allow companies to commission a customized security testing program that fits their specific requirements. Bugcrowd's proprietary vulnerability disclosure platform is deployed by Tesla Motors, The Western Union Company, Pinterest, Barracuda Networks and Based in San Francisco, Bugcrowd is backed by Blackbird Ventures, Costanoa Ventures, Industry Ventures, Paladin Capital Group, Rally Ventures and Salesforce Ventures. Bugcrowd is a trademark of Bugcrowd, Inc. Learn more at

About Intercom

The way businesses talk to people online is broken. Intercom is fixing it.

Intercom is the first to bring messaging products for sales, marketing & customer service to one platform, helping businesses avoid the stiff, spammy status quo and have real conversations that build real connections. Designed to feel like the messaging apps you use every day, Intercom lets you talk to consumers almost anywhere: inside your app, on your website, across social media and via email. Today more than 15,000 businesses use Intercom to connect with a billion people worldwide. Intercom has raised $116M in venture funding, and has 300 employees across its San Francisco headquarters, Dublin R&D office, and recently opened Chicago office.


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
8 Ways Hackers Monetize Stolen Data
Steve Zurier, Freelance Writer,  4/17/2018
Securing Social Media: National Safety, Privacy Concerns
Kelly Sheridan, Staff Editor, Dark Reading,  4/19/2018
Firms More Likely to Tempt Security Pros With Big Salaries than Invest in Training
Sara Peters, Senior Editor at Dark Reading,  4/19/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.