Vulnerabilities / Threats
12:30 PM
Dark Reading
Dark Reading
Products and Releases

Intercom Launches Bugcrowd Bug Bounty Program

Bugcrowd's curated crowd, simple-to-use platform and deep program expertise helps Intercom to secure customer data.

SAN FRANCISCO – February 16, 2017Intercom, the customer messaging platform, today launched a public bug bounty program with Bugcrowd, the leader in crowdsourced security testing. Building on the success of its private program, Intercom is now launching a public bug bounty program to leverage the full scope of Bugcrowd’s curated crowd of 50,000 cybersecurity researchers to help implement a secure development lifecycle and protect customer data.

Intercom’s public bug bounty program will issue monetary rewards of up to $1,500 per vulnerability identified, depending on impact and severity. The scope includes anything that relates to Intercom’s main application functionality and their iOS and Android SDKs. Intercom believes that the program is one of the best ways to address and stay on top of the latest cybersecurity challenges.

“Intercom's business relies on customer trust. To keep this trust we need to use the best tools available to keep our customers’ data secure,” said Thibault Candebat, Information Security Manager, Intercom. “Our private bug bounty program with Bugcrowd allowed us to tap into the creativity and abilities of hundreds of security researchers  to find and report the most complex bugs – the ones vulnerability scanners just can’t uncover. Now we’re expanding our program for access to a bigger pool of researchers to improve our ability to find and fix vulnerabilities.”

Bugcrowd connects organizations with a global network of tens of thousands of security researchers to identify vulnerabilities quicker and allow organizations to remediate issues before the adversaries can take advantage of them. Over the last four years, hundreds of organizations have harnessed Bugcrowd’s curated crowd, simple-to- use platform and deep program expertise to improve their security. By building this security expertise into the design, support and management of bug bounty programs, Bugcrowd ensures that organizations at all stages of security maturity realize real value from crowdsourced testing.

"Bug bounty adoption has taken off in the last year as it’s become clear that they are not only an asset to organizations, they are vital to the security of businesses," said Casey Ellis, CEO and founder of Bugcrowd. "Just as clear is the need for a trusted, experienced partner to ensure the success of these bounty programs. We are thrilled to partner with Intercom to help enable secure communications for their customers.”

To learn more about Intercom’s public bug bounty program or to participate, visit

About Bugcrowd, Inc.

The pioneer and innovator in crowdsourced security testing for the enterprise, Bugcrowd harnesses the power of more than 50,000 security researchers to surface critical software vulnerabilities and level the playing field in cybersecurity. Bugcrowd also provides a range of responsible disclosure and managed service options that allow companies to commission a customized security testing program that fits their specific requirements. Bugcrowd's proprietary vulnerability disclosure platform is deployed by Tesla Motors, The Western Union Company, Pinterest, Barracuda Networks and Based in San Francisco, Bugcrowd is backed by Blackbird Ventures, Costanoa Ventures, Industry Ventures, Paladin Capital Group, Rally Ventures and Salesforce Ventures. Bugcrowd is a trademark of Bugcrowd, Inc. Learn more at

About Intercom

The way businesses talk to people online is broken. Intercom is fixing it.

Intercom is the first to bring messaging products for sales, marketing & customer service to one platform, helping businesses avoid the stiff, spammy status quo and have real conversations that build real connections. Designed to feel like the messaging apps you use every day, Intercom lets you talk to consumers almost anywhere: inside your app, on your website, across social media and via email. Today more than 15,000 businesses use Intercom to connect with a billion people worldwide. Intercom has raised $116M in venture funding, and has 300 employees across its San Francisco headquarters, Dublin R&D office, and recently opened Chicago office.


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.