Vulnerabilities / Threats
2/16/2017
12:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Intercom Launches Bugcrowd Bug Bounty Program

Bugcrowd's curated crowd, simple-to-use platform and deep program expertise helps Intercom to secure customer data.

SAN FRANCISCO – February 16, 2017Intercom, the customer messaging platform, today launched a public bug bounty program with Bugcrowd, the leader in crowdsourced security testing. Building on the success of its private program, Intercom is now launching a public bug bounty program to leverage the full scope of Bugcrowd’s curated crowd of 50,000 cybersecurity researchers to help implement a secure development lifecycle and protect customer data.

Intercom’s public bug bounty program will issue monetary rewards of up to $1,500 per vulnerability identified, depending on impact and severity. The scope includes anything that relates to Intercom’s main application functionality and their iOS and Android SDKs. Intercom believes that the program is one of the best ways to address and stay on top of the latest cybersecurity challenges.

“Intercom's business relies on customer trust. To keep this trust we need to use the best tools available to keep our customers’ data secure,” said Thibault Candebat, Information Security Manager, Intercom. “Our private bug bounty program with Bugcrowd allowed us to tap into the creativity and abilities of hundreds of security researchers  to find and report the most complex bugs – the ones vulnerability scanners just can’t uncover. Now we’re expanding our program for access to a bigger pool of researchers to improve our ability to find and fix vulnerabilities.”

Bugcrowd connects organizations with a global network of tens of thousands of security researchers to identify vulnerabilities quicker and allow organizations to remediate issues before the adversaries can take advantage of them. Over the last four years, hundreds of organizations have harnessed Bugcrowd’s curated crowd, simple-to- use platform and deep program expertise to improve their security. By building this security expertise into the design, support and management of bug bounty programs, Bugcrowd ensures that organizations at all stages of security maturity realize real value from crowdsourced testing.

"Bug bounty adoption has taken off in the last year as it’s become clear that they are not only an asset to organizations, they are vital to the security of businesses," said Casey Ellis, CEO and founder of Bugcrowd. "Just as clear is the need for a trusted, experienced partner to ensure the success of these bounty programs. We are thrilled to partner with Intercom to help enable secure communications for their customers.”

To learn more about Intercom’s public bug bounty program or to participate, visit https://bugcrowd.com/intercom.

About Bugcrowd, Inc.

The pioneer and innovator in crowdsourced security testing for the enterprise, Bugcrowd harnesses the power of more than 50,000 security researchers to surface critical software vulnerabilities and level the playing field in cybersecurity. Bugcrowd also provides a range of responsible disclosure and managed service options that allow companies to commission a customized security testing program that fits their specific requirements. Bugcrowd's proprietary vulnerability disclosure platform is deployed by Tesla Motors, The Western Union Company, Pinterest, Barracuda Networks and Jet.com. Based in San Francisco, Bugcrowd is backed by Blackbird Ventures, Costanoa Ventures, Industry Ventures, Paladin Capital Group, Rally Ventures and Salesforce Ventures. Bugcrowd is a trademark of Bugcrowd, Inc. Learn more at https://www.bugcrowd.com.

About Intercom

The way businesses talk to people online is broken. Intercom is fixing it.

Intercom is the first to bring messaging products for sales, marketing & customer service to one platform, helping businesses avoid the stiff, spammy status quo and have real conversations that build real connections. Designed to feel like the messaging apps you use every day, Intercom lets you talk to consumers almost anywhere: inside your app, on your website, across social media and via email. Today more than 15,000 businesses use Intercom to connect with a billion people worldwide. Intercom has raised $116M in venture funding, and has 300 employees across its San Francisco headquarters, Dublin R&D office, and recently opened Chicago office.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/16/2017
Mobile Malware Incidents Hit 100% of Businesses
Dawn Kawamoto, Associate Editor, Dark Reading,  11/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.