...
Vulnerability Management Process
Bug Bounty / Hackerone
Vulnerability Reports & Disclosure
Pentesting
Internal
External
Projects
Task & Project Management
Code Analysis
Static Code Analysis
Security Training
Awareness & Training Plan
Server investigation
When contacted about a potentially rogue server, i.e. a server used for criminal purposes, we follow our internal Standard Operating Procedure here.
...