Our internal team is globally acknowledged for reporting security vulnerabilities and listed in hall-of-fame on Fortune 500 companies like: Microsoft, Facebook, Nokia, IKEA, Adobe, Dell, Apple, US Department of Defense, BMW Group, Daimler and hundred of more.
A decade experience in industry working for LEA and big companies.
Community builder and cyber influencers
Tens of professional certifications, 100+ training's
Have you thought why companies like Google, Microsoft, Ebay, Paypal are worldwide most secure platforms. By their own bug bounty programs call then-after reward hackers for reporting security issues on their systems. We offer user friendly bug bounty for every single company no matter size and the budget. Our highly skilled security professionals would help you go step forward. Give them a chance. More eyes for better security.
Add Your Own Programs Each program is either managed by the our team or run by company peer2peer.
Define Your Scope The scope defines what applications/services they will take submissions, pre-defined rules, scanning-time, accepted reports of vulnerabilities.
Choose Your Privacy For all of your programs you can choose to become (PRIVATE) only for invited hackers or (PUBLIC) for all hackers that are registered.
We have been working for Law Enforcement Agencies for a decades while helping them protect their critical infrastructure. Within our heroes we provide national cyber security shield.
I'm seeking for potential Cyber Security professionals interested on new job opportunities. FindBug provides statistical analysis, including recommendation and proven records to help you on selection process.
Joined 50 hats
+30 more hats
FindBUG was established
Research & Building model
New release, Launch!
Making the world a safer place
Over the years we selected out of the box thinkers from Universities and High School to help government and companies uncovering their security vulnerabilities. This year we hosted the 5th edition of 'THE DAY WHEN HACKING IS LEGAL' hackathon to meet them in person. Start your journey now!
FINDBUG is wonderful bug bounty platform, help youngsters get motivated, hack for fun and earn good money. I’m the winner of the 5th contest ‘The day when hacking is legal’ except I was paid for bounty I got 3 more year scholarship from the university I reported vulnerabilities.
I’m so happy with FINDBUG, they are doing a great job on security awareness, bug bounties and responsible disclosure. Can’t wait for more scope to scan. I’m the 2nd place winner on ‘THE DAY WHEN HACKING IS LEGAL V’ hackathon.
The platform is user friendly and well designed for security engineers. Be aware that you cannot sign-up as a hacker just filling a sign-up form, the puzzle with hidden confirmation code to finish signup process makes the game more fun.
We published white papers on hackers behavior, how and when they started, how they improve out of box thinking skills and much more. We understand their language, and business needs too.
Their founding over three previous 8h bootcamps have been shared with numbers.
Our experienced advice:
Hacker Trust is a formula invented by FindBUG to determine which Hacker is the most trustworthy and valuable based on some parameters that we take into consideration. Some of them are Sign UP CTF / Identity Verification / TDWHL / Bug Accuracy.
Program Strength is basically a way to determine the complexity of a program based on a internal questionnaire that FindBug asks companies that want to join our platform. This questionnaire will determine which the best way to pay security researchers that want to report to your program. But also security researchers will be able to know how much complex is a specific program.
The main difference is on hackers involved, when you go public all of our registered ethical hackers can view your program otherwise Private Programs you can decide security researchers you want to involve based on their Hacker Trust, Ranks and Skills.
Skills Endorsements a feature not seen before on bug bounties allows companies to endorse Plisa Hackers based on their technical skills. Through this companies can determine which is the most suitable for their program. Researchers will have the same ability to endorse each other. The researcher will be able to select up to 5 skills
You can create a program through our the button “Add Program” which is linked to your account plan. You will have 5 steps that you need to complete in order to send your application to FindBUG which will be reviewed within a couple of working days.
Plisa Hackers are regular security researchers that finds vulnerabilities and report them through FindBUG platform. We call them “Plisa” because the word “Plisa” roots from Albanian tradition which is a symbol of a white hat that was used since time of Illyrians in the Balkans. And we connect “Plisa Hackers” to “White Hat Hackers”
Based on our experience we developed user friendly bug bounty that is hacker oriented. All we need is your positive energy to support companies that trusted us.
``white HAT for white LIFE``
“Among a thousand of applicants our start-up have been selected on TOP5 most promising start-up of 2018 from the Ministry of Innovation and Enterpreneurship”
“ Findbug have been selected to present on biggest CEE conference Wolves Summit 2019, let's meet on March and talk”
"FindBUG LLC is selected to Startup Turkey Top 100 Demo Day. More than 150 countries, 120.000 startup applications. Only 1% is approved to join the Startup Turkey full program on 26-29 April in Istanbul, including pitching on the main stage"
Wiper Malware Called “Coronavirus” Spreads Among Windows Victims Like NotPetya, it overwrites the master boot record to render computers “trashed.” A new Windows malware has emerged that makes disks unusable by overwriting the master boot record (MBR). It takes its...
A design flaw in Microsoft’s Skype app can be exploited to grant access to the data on your Android phone without passcode authentication, a researcher has shown. Kosovo-based bug-hunter Florian Kunushevci demonstrates in the YouTube video below how Skype can...
Wells Fargo’s chief information security officer Rich Baich has to be very strategic about the way he spends his budget in order to protect the bank from the endless stream of cyberattacks launched at it every day. At the 2017 Borderless...
The International Conference on Cyber Security and Privacy will bring tremendous innovation from the field of online security and privacy. On February 2 there is a rare and unique opportunity for Kosovo and the Region. “The Day When Hacking is...