Vitaly Simonovich

VITALYSIMONOVICH

Security Researcher
0+

Years Experience

0

CVEs Discovered

0+

Public Speaking

0+

Press Mentions

BUILDING
SECURE AI

Senior security researcher working at the intersection of LLM security, threat intelligence, and vulnerability research. I break AI systems the way real attackers do—from jailbreaks and prompt injection to LLM-powered malware and supply-chain backdoors—and turn those findings into practical defenses, threat reports, and education so organizations can safely adopt AI.

Core Expertise

LLM & GenAI Security
Jailbreaks & Prompt Injection
Threat Intelligence
Vulnerability Research
Application Security
Data Security
Offensive Security & CTFs
Security Education & Public Speaking

RECOGNITION & CVE DISCOVERIES

CVEs

Medium

CVE-2026-0859

Insecure Deserialization vulnerability in TYPO3 CMS Mailer file spool allowing local users with write access to the spool directory to inject and execute arbitrary PHP code via crafted serialized files.

1 of 5 CVEs

ACHIEVEMENTS

AI Safety - Immersive world jailbreak

Microsoft

2025
1 of 2 awards

PRESS

PR Newswire favicon

The Rise of the Zero-Knowledge Threat Actor: New LLM Jailbreak Technique Discovered by Cato Networks Enables Easy Creation of Password-Stealing Malware

PR Newswire2025press_release

Press release quoting Vitaly Simonovich describing the Immersive World jailbreak that coerced GenAI tools into writing Chrome infostealers.

press releaseAIjailbreak
Infosecurity Magazine favicon

Security Researcher Proves GenAI Tools Can Develop Google Chrome Infostealers

Infosecurity Magazine2025feature

Feature about your Cato CTRL experiment where you used Immersive World to get LLMs to write a Chrome infostealer.

GenAIChromeinfostealer
TechNewsWorld favicon

AI Chatbots Can Be Easy Prey for 'Zero-Knowledge' Hackers

TechNewsWorld2025feature

Article quoting you about Immersive World and describing how you bypassed safeguards in ChatGPT, Copilot and DeepSeek.

ChatGPTCopilotDeepSeekjailbreak
ControlF5 Software favicon

AI Chatbots: The New Target For Zero-Knowledge Hackers

ControlF5 Software2025feature

Blog summarizing TechNewsWorld's coverage of your Immersive World jailbreak and naming you as the researcher.

AIchatbotssecurity
63sats favicon

When Fiction Becomes a Cyber Weapon: How AI Was Tricked into Writing Malware

63sats2025feature

Article citing Vitaly Simonovich by name and describing Immersive World as a new flavor of AI jailbreak.

AIjailbreakmalware
ISOEH favicon

Vibe Hacking: When AI Turns Beginners into Cybercriminals

ISOEH2025feature

Blog explicitly citing you and your Immersive World experiment as proof that non-experts can create malware with AI.

vibe hackingAIcybercrime
CSO Online favicon

WormGPT returns: New malicious AI variants built on Grok and Mixtral uncovered

CSO Online2025feature

News article quoting Cato CTRL researcher Vitaly Simonovich on WormGPT variants that hijack mainstream LLM APIs.

WormGPTGrokMixtral
CyberScoop favicon

Researchers say AI hacking tools sold online were powered by Grok, Mixtral

CyberScoop2025feature

Story citing Cato Networks researcher Vitaly Simonovich about underground WormGPT services built on Grok and Mixtral.

CyberScoopAI toolsdark web
VentureBeat favicon

The end of perimeter defense: When your own AI tools become the threat actor

VentureBeat2025interview

Long-form piece built around your LAMEHUG research and Immersive World demo; includes extensive quotes from you.

VentureBeatLAMEHUGinterview
SlashGear favicon

AI Browsers Face A New Kind Of Attack, And It Puts Your Privacy At Risk

SlashGear2025-12-07feature

Consumer-focused coverage of HashJack attack demonstrating how AI browsers can display incorrect medication dosages on trusted pharmaceutical sites.

HashJackAIprivacyconsumer tech
F5 Labs favicon

HashJack Attack Targets AI Browsers and Agentic AI Systems

F5 Labs2025-12-05feature

Technical analysis of HashJack vulnerability with enterprise security recommendations for AI agents and agentic systems.

HashJackAIF5 Labsenterprise securityagentic AI
The Hacker News favicon

Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails

The Hacker News2025-12-05feature

The Hacker News coverage featuring HashJack attack by Cato Networks alongside other AI browser vulnerabilities, quoting Vitaly Simonovich.

HashJackAIThe Hacker Newsagentic AI
Hackread favicon

HashJack Attack Uses URL '#' to Control AI Browser Behavior

Hackread2025-11-29feature

Coverage of Cato CTRL's HashJack disclosure showing how URL fragments can be exploited to inject malicious prompts into AI browser assistants.

HashJackAIprompt injectionURL fragments
SecurityWeek favicon

In Other News: HashJack AI Browser Attack, Charming Kitten Leak, Hacker Unmasked

SecurityWeek2025-11-29mention

SecurityWeek news roundup featuring HashJack AI browser attack discovered by Cato CTRL researchers.

HashJackAISecurityWeeknews roundup
TechRadar favicon

AI browsers can be hacked with a simple hashtag, experts warn

TechRadar2025-11-28feature

TechRadar Pro coverage warning about HashJack technique that allows AI browsers to be hijacked with just a hashtag in a URL.

HashJackAITechRadarmainstream tech
Infosecurity Magazine favicon

HashJack Indirect Prompt Injection Weaponizes Websites

Infosecurity Magazine2025-11-26feature

Coverage of HashJack technique discovered by Cato CTRL that enables attackers to hide malicious instructions in URL fragments to manipulate AI browsers.

HashJackAIInfosecurity Magazineprompt injection
Help Net Security favicon

New 'HashJack' Attack Can Hijack AI Browsers and Assistants

Help Net Security2025-11-26feature

Article on Cato Networks' HashJack research showing how URL fragments can be weaponized to force AI browsers to deliver phishing links or exfiltrate data.

HashJackAIHelp Net Securitybrowser security
CybersecurityNews favicon

HashJack: New Attack Technique Tricks AI Browsers Using a Simple '#'

CybersecurityNews2025-11-26feature

Coverage of Cato CTRL's HashJack indirect prompt injection technique that exploits URL fragments to manipulate AI browser assistants.

HashJackAIprompt injection
GBHackers favicon

HashJack: A Novel Exploit Leveraging URL Fragments To Deceive AI Browsers

GBHackers2025-11-26feature

Article on HashJack security threat that exploits how URL fragments function in AI-powered browsers to deceive and manipulate them.

HashJackAIURL fragmentsexploit
Israel Hayom favicon

Israeli tech firm finds AI vulnerability – Gemini susceptible

Israel Hayom2025-11-26feature

Coverage of Cato Networks' CTRL research group discovery of HashJack vulnerability affecting Google Gemini, Microsoft Copilot, and Perplexity Comet.

HashJackAIIsrael HayomGeminiCopilot
Forbes favicon

Password-Stealing AI HashJack Threat To Web Browsers Confirmed

Forbes2025-11-26feature

Davey Winder covers Cato Networks' discovery of HashJack, a new AI browser threat that can steal passwords by exploiting URL fragments.

HashJackForbesAIbrowser securitypasswords
SC World favicon

AI browser assistants vulnerable to HashJack prompt injection technique

SC World2025-11-26feature

Coverage of Cato CTRL's HashJack research showing AI browser assistants are vulnerable to indirect prompt injection via URL fragments.

HashJackSC WorldAIprompt injection
CyberPress favicon

HashJack: A New Attack That Fools AI Browsers With a Simple '#'

CyberPress2025-11-26feature

Coverage of HashJack vulnerability showing how URL fragments bypass traditional security defenses to manipulate AI browsers.

HashJackAIbrowser security
Xakep.ru favicon

ИИ-браузеры можно обмануть с помощью символа «#»

Xakep.ru2025-11-26feature

Russian coverage of HashJack research quoting Vitaly Simonovich on how attackers can use URL fragments to inject hidden commands into AI browsers.

HashJackAIRussian mediaprompt injection
SecurityLab.ru favicon

HashJack: новая атака через символ # обманывает ИИ-браузеры

SecurityLab.ru2025-11-26feature

Russian security news coverage of HashJack vulnerability affecting AI browser assistants like Gemini, Copilot, and Comet.

HashJackAIRussian mediabrowser security
SiliconANGLE favicon

New 'HashJack' technique lets attackers manipulate AI assistants in Comet, Copilot and Gemini

SiliconANGLE2025-11-25feature

Coverage of Cato CTRL's discovery of HashJack, an indirect prompt injection technique that exploits URL fragments to manipulate AI browser assistants.

HashJackAIprompt injectionbrowser security
The Register favicon

HashJack attack shows AI browsers can be fooled with a simple '#'

The Register2025-11-25feature

Feature on Cato Networks' discovery of HashJack vulnerability that exploits URL fragments to manipulate AI browser assistants like Copilot, Gemini, and Comet.

HashJackAIThe Registerbrowser security
The Economist favicon

How AI-powered hackers are stealing billions

The Economist2025-08-19feature

Business feature that opens with your Velora/Jaxon story and names you as the Cato Networks researcher who tricked ChatGPT into writing malware.

The EconomistAIChatGPTmalware
GreaterFool.ca favicon

Into the storm

GreaterFool.ca2025-04-03quote

Commentary that quotes Cato threat researcher Vitaly Simonovich and his Immersive World jailbreak technique.

commentaryAI
Forbes favicon

Google Chrome Passwords Alert—Beware The Rise Of The AI Infostealers

Forbes2025-03-21feature

Column quoting you on the Immersive World jailbreak and the risk of AI-generated infostealers targeting Chrome passwords.

ForbesChromeAIinfostealers
Business Insider favicon

How do you get ChatGPT to create malware strong enough to breach Google's password manager? Just play pretend.

Business Insider2025-03interview

Interview where you explain how narrative role-play (Immersive World) led ChatGPT to write a Chrome password-stealing infostealer.

Business InsiderChatGPTinterviewmalware
Botconf 2022 favicon

Warning! Botnet is in your house...

Botconf 20222022conference_talk

Conference talk slide deck by Sarit Yerushalmi and Vitaly Simonovich (Imperva) on home-network botnet infections.

botnethome networkconference
Dark Reading favicon

Mirai-Like Botnet Wages Massive Application-Layer DDoS Attack

Dark Reading2019-07feature

Article quoting Imperva security researcher Vitaly Simonovich about a Mirai-like IoT botnet behind a massive L7 DDoS attack.

MiraiDDoSIoTbotnet
BankInfoSecurity favicon

Massive Botnet Attack Used More Than 400000 IoT Devices

BankInfoSecurity2019-07feature

Coverage quoting you that the attack was the largest Layer-7 DDoS Imperva had ever seen.

IoTbotnetDDoS
SecurityWeek favicon

Large-scale DDoS Attack Abuses HTML's Hyperlink Audit Ping Facility

SecurityWeek2019-04feature

Feature describing an attack monitored by Imperva researchers Vitaly Simonovich and Dima Bekerman using HTML5 ping for DDoS.

HTML5DDoSbrowser-based attack
eWEEK favicon

How HTML5 Ping Is Used in DDoS Attacks

eWEEK2019-04quote

Explainer quoting Imperva security researcher Vitaly Simonovich on how attackers abused HTML5 ping for application-layer DDoS.

HTML5DDoS
IsraelDefense favicon

Imperva Discovers New DDoS Attack that Abuses HTML5 Ping-Based Hyperlink Auditing Feature

IsraelDefense2019-04feature

News item crediting Imperva experts Vitaly Simonovich and Dima Bekerman for discovering the HTML5 ping DDoS technique.

HTML5DDoSdiscovery
BleepingComputer favicon

Vulnerable Docker Hosts Actively Abused in Cryptojacking Campaigns

BleepingComputer2019-03feature

News article describing how Imperva's Vitaly Simonovich and Ori Nakar found thousands of exposed Docker daemons abused for Monero mining.

DockercryptojackingImperva
SDxCentral favicon

Imperva Researchers Find Hundreds of Vulnerable Docker Hosts Exploited by Cryptominers

SDxCentral2019-03feature

Coverage of Imperva research where Vitaly Simonovich and Ori Nakar show attackers abusing exposed Docker APIs to run cryptominers.

DockerAPI security
SC Media favicon

Docker API vulnerability allows hackers to mine Monero

SC Media2019-03feature

Article quoting Imperva researchers Vitaly Simonovich and Ori Nakar on misconfigured Docker APIs being hijacked for Monero mining.

DockerMonerocryptomining
PR Newswire favicon

The Rise of the Zero-Knowledge Threat Actor: New LLM Jailbreak Technique Discovered by Cato Networks Enables Easy Creation of Password-Stealing Malware

PR Newswire2025press_release

Press release quoting Vitaly Simonovich describing the Immersive World jailbreak that coerced GenAI tools into writing Chrome infostealers.

press releaseAIjailbreak
Infosecurity Magazine favicon

Security Researcher Proves GenAI Tools Can Develop Google Chrome Infostealers

Infosecurity Magazine2025feature

Feature about your Cato CTRL experiment where you used Immersive World to get LLMs to write a Chrome infostealer.

GenAIChromeinfostealer
TechNewsWorld favicon

AI Chatbots Can Be Easy Prey for 'Zero-Knowledge' Hackers

TechNewsWorld2025feature

Article quoting you about Immersive World and describing how you bypassed safeguards in ChatGPT, Copilot and DeepSeek.

ChatGPTCopilotDeepSeekjailbreak
ControlF5 Software favicon

AI Chatbots: The New Target For Zero-Knowledge Hackers

ControlF5 Software2025feature

Blog summarizing TechNewsWorld's coverage of your Immersive World jailbreak and naming you as the researcher.

AIchatbotssecurity
63sats favicon

When Fiction Becomes a Cyber Weapon: How AI Was Tricked into Writing Malware

63sats2025feature

Article citing Vitaly Simonovich by name and describing Immersive World as a new flavor of AI jailbreak.

AIjailbreakmalware
ISOEH favicon

Vibe Hacking: When AI Turns Beginners into Cybercriminals

ISOEH2025feature

Blog explicitly citing you and your Immersive World experiment as proof that non-experts can create malware with AI.

vibe hackingAIcybercrime
CSO Online favicon

WormGPT returns: New malicious AI variants built on Grok and Mixtral uncovered

CSO Online2025feature

News article quoting Cato CTRL researcher Vitaly Simonovich on WormGPT variants that hijack mainstream LLM APIs.

WormGPTGrokMixtral
CyberScoop favicon

Researchers say AI hacking tools sold online were powered by Grok, Mixtral

CyberScoop2025feature

Story citing Cato Networks researcher Vitaly Simonovich about underground WormGPT services built on Grok and Mixtral.

CyberScoopAI toolsdark web
VentureBeat favicon

The end of perimeter defense: When your own AI tools become the threat actor

VentureBeat2025interview

Long-form piece built around your LAMEHUG research and Immersive World demo; includes extensive quotes from you.

VentureBeatLAMEHUGinterview
SlashGear favicon

AI Browsers Face A New Kind Of Attack, And It Puts Your Privacy At Risk

SlashGear2025-12-07feature

Consumer-focused coverage of HashJack attack demonstrating how AI browsers can display incorrect medication dosages on trusted pharmaceutical sites.

HashJackAIprivacyconsumer tech
F5 Labs favicon

HashJack Attack Targets AI Browsers and Agentic AI Systems

F5 Labs2025-12-05feature

Technical analysis of HashJack vulnerability with enterprise security recommendations for AI agents and agentic systems.

HashJackAIF5 Labsenterprise securityagentic AI
The Hacker News favicon

Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails

The Hacker News2025-12-05feature

The Hacker News coverage featuring HashJack attack by Cato Networks alongside other AI browser vulnerabilities, quoting Vitaly Simonovich.

HashJackAIThe Hacker Newsagentic AI
Hackread favicon

HashJack Attack Uses URL '#' to Control AI Browser Behavior

Hackread2025-11-29feature

Coverage of Cato CTRL's HashJack disclosure showing how URL fragments can be exploited to inject malicious prompts into AI browser assistants.

HashJackAIprompt injectionURL fragments
SecurityWeek favicon

In Other News: HashJack AI Browser Attack, Charming Kitten Leak, Hacker Unmasked

SecurityWeek2025-11-29mention

SecurityWeek news roundup featuring HashJack AI browser attack discovered by Cato CTRL researchers.

HashJackAISecurityWeeknews roundup
TechRadar favicon

AI browsers can be hacked with a simple hashtag, experts warn

TechRadar2025-11-28feature

TechRadar Pro coverage warning about HashJack technique that allows AI browsers to be hijacked with just a hashtag in a URL.

HashJackAITechRadarmainstream tech
Infosecurity Magazine favicon

HashJack Indirect Prompt Injection Weaponizes Websites

Infosecurity Magazine2025-11-26feature

Coverage of HashJack technique discovered by Cato CTRL that enables attackers to hide malicious instructions in URL fragments to manipulate AI browsers.

HashJackAIInfosecurity Magazineprompt injection
Help Net Security favicon

New 'HashJack' Attack Can Hijack AI Browsers and Assistants

Help Net Security2025-11-26feature

Article on Cato Networks' HashJack research showing how URL fragments can be weaponized to force AI browsers to deliver phishing links or exfiltrate data.

HashJackAIHelp Net Securitybrowser security
CybersecurityNews favicon

HashJack: New Attack Technique Tricks AI Browsers Using a Simple '#'

CybersecurityNews2025-11-26feature

Coverage of Cato CTRL's HashJack indirect prompt injection technique that exploits URL fragments to manipulate AI browser assistants.

HashJackAIprompt injection
GBHackers favicon

HashJack: A Novel Exploit Leveraging URL Fragments To Deceive AI Browsers

GBHackers2025-11-26feature

Article on HashJack security threat that exploits how URL fragments function in AI-powered browsers to deceive and manipulate them.

HashJackAIURL fragmentsexploit
Israel Hayom favicon

Israeli tech firm finds AI vulnerability – Gemini susceptible

Israel Hayom2025-11-26feature

Coverage of Cato Networks' CTRL research group discovery of HashJack vulnerability affecting Google Gemini, Microsoft Copilot, and Perplexity Comet.

HashJackAIIsrael HayomGeminiCopilot
Forbes favicon

Password-Stealing AI HashJack Threat To Web Browsers Confirmed

Forbes2025-11-26feature

Davey Winder covers Cato Networks' discovery of HashJack, a new AI browser threat that can steal passwords by exploiting URL fragments.

HashJackForbesAIbrowser securitypasswords
SC World favicon

AI browser assistants vulnerable to HashJack prompt injection technique

SC World2025-11-26feature

Coverage of Cato CTRL's HashJack research showing AI browser assistants are vulnerable to indirect prompt injection via URL fragments.

HashJackSC WorldAIprompt injection
CyberPress favicon

HashJack: A New Attack That Fools AI Browsers With a Simple '#'

CyberPress2025-11-26feature

Coverage of HashJack vulnerability showing how URL fragments bypass traditional security defenses to manipulate AI browsers.

HashJackAIbrowser security
Xakep.ru favicon

ИИ-браузеры можно обмануть с помощью символа «#»

Xakep.ru2025-11-26feature

Russian coverage of HashJack research quoting Vitaly Simonovich on how attackers can use URL fragments to inject hidden commands into AI browsers.

HashJackAIRussian mediaprompt injection
SecurityLab.ru favicon

HashJack: новая атака через символ # обманывает ИИ-браузеры

SecurityLab.ru2025-11-26feature

Russian security news coverage of HashJack vulnerability affecting AI browser assistants like Gemini, Copilot, and Comet.

HashJackAIRussian mediabrowser security
SiliconANGLE favicon

New 'HashJack' technique lets attackers manipulate AI assistants in Comet, Copilot and Gemini

SiliconANGLE2025-11-25feature

Coverage of Cato CTRL's discovery of HashJack, an indirect prompt injection technique that exploits URL fragments to manipulate AI browser assistants.

HashJackAIprompt injectionbrowser security
The Register favicon

HashJack attack shows AI browsers can be fooled with a simple '#'

The Register2025-11-25feature

Feature on Cato Networks' discovery of HashJack vulnerability that exploits URL fragments to manipulate AI browser assistants like Copilot, Gemini, and Comet.

HashJackAIThe Registerbrowser security
The Economist favicon

How AI-powered hackers are stealing billions

The Economist2025-08-19feature

Business feature that opens with your Velora/Jaxon story and names you as the Cato Networks researcher who tricked ChatGPT into writing malware.

The EconomistAIChatGPTmalware
GreaterFool.ca favicon

Into the storm

GreaterFool.ca2025-04-03quote

Commentary that quotes Cato threat researcher Vitaly Simonovich and his Immersive World jailbreak technique.

commentaryAI
Forbes favicon

Google Chrome Passwords Alert—Beware The Rise Of The AI Infostealers

Forbes2025-03-21feature

Column quoting you on the Immersive World jailbreak and the risk of AI-generated infostealers targeting Chrome passwords.

ForbesChromeAIinfostealers
Business Insider favicon

How do you get ChatGPT to create malware strong enough to breach Google's password manager? Just play pretend.

Business Insider2025-03interview

Interview where you explain how narrative role-play (Immersive World) led ChatGPT to write a Chrome password-stealing infostealer.

Business InsiderChatGPTinterviewmalware
Botconf 2022 favicon

Warning! Botnet is in your house...

Botconf 20222022conference_talk

Conference talk slide deck by Sarit Yerushalmi and Vitaly Simonovich (Imperva) on home-network botnet infections.

botnethome networkconference
Dark Reading favicon

Mirai-Like Botnet Wages Massive Application-Layer DDoS Attack

Dark Reading2019-07feature

Article quoting Imperva security researcher Vitaly Simonovich about a Mirai-like IoT botnet behind a massive L7 DDoS attack.

MiraiDDoSIoTbotnet
BankInfoSecurity favicon

Massive Botnet Attack Used More Than 400000 IoT Devices

BankInfoSecurity2019-07feature

Coverage quoting you that the attack was the largest Layer-7 DDoS Imperva had ever seen.

IoTbotnetDDoS
SecurityWeek favicon

Large-scale DDoS Attack Abuses HTML's Hyperlink Audit Ping Facility

SecurityWeek2019-04feature

Feature describing an attack monitored by Imperva researchers Vitaly Simonovich and Dima Bekerman using HTML5 ping for DDoS.

HTML5DDoSbrowser-based attack
eWEEK favicon

How HTML5 Ping Is Used in DDoS Attacks

eWEEK2019-04quote

Explainer quoting Imperva security researcher Vitaly Simonovich on how attackers abused HTML5 ping for application-layer DDoS.

HTML5DDoS
IsraelDefense favicon

Imperva Discovers New DDoS Attack that Abuses HTML5 Ping-Based Hyperlink Auditing Feature

IsraelDefense2019-04feature

News item crediting Imperva experts Vitaly Simonovich and Dima Bekerman for discovering the HTML5 ping DDoS technique.

HTML5DDoSdiscovery
BleepingComputer favicon

Vulnerable Docker Hosts Actively Abused in Cryptojacking Campaigns

BleepingComputer2019-03feature

News article describing how Imperva's Vitaly Simonovich and Ori Nakar found thousands of exposed Docker daemons abused for Monero mining.

DockercryptojackingImperva
SDxCentral favicon

Imperva Researchers Find Hundreds of Vulnerable Docker Hosts Exploited by Cryptominers

SDxCentral2019-03feature

Coverage of Imperva research where Vitaly Simonovich and Ori Nakar show attackers abusing exposed Docker APIs to run cryptominers.

DockerAPI security
SC Media favicon

Docker API vulnerability allows hackers to mine Monero

SC Media2019-03feature

Article quoting Imperva researchers Vitaly Simonovich and Ori Nakar on misconfigured Docker APIs being hijacked for Monero mining.

DockerMonerocryptomining
40 press articles

RESEARCH18

2025-11-25researchCato Networks Blog

Cato CTRL Threat Research: HashJack - First Known Indirect Prompt Injection Against AI Browser Assistants

Novel indirect prompt injection technique that weaponizes URL fragments to manipulate AI browser assistants like Copilot, Gemini, and Comet.

AIprompt injectionbrowser securityCopilotGeminiURL fragments
Read Article

SPEAKING8

Upcomingconference

The Anatomy of Criminal Failure: Analyzing OpSec Flaws in Major Takedowns

RSA Conference 2026
March 23, 2026San Francisco, CA, USA

An in-depth analysis of operational security failures that led to the takedown of major cybercriminal operations, examining the mistakes that ultimately exposed threat actors to law enforcement.

Recording coming soon

MY BLOG10

LinkedInBug BountyThreat ActorsScopeMicrosoftSecurity Programs

Threat Actors Don't Care About Your Fucking Scope

A critical examination of how bug bounty scope limitations create dangerous security blind spots, with insights from Microsoft's shift to 'In Scope By Default' and real-world breach examples.

Get in touch
Lectures, interviews, or collaborations?

Always open to discussing new opportunities, interesting projects, or just chatting about security and AI.

Remote, available worldwide
Vitaly Simonovich | Security Researcher