{
  "type": "bundle",
  "id": "bundle--3cae683a-244b-4809-9c7c-174d6bf9e322",
  "objects": [
    {
      "type": "report",
      "spec_version": "2.1",
      "id": "report--f68fd6a4-5547-4ea7-b350-0f1e44b4cc65",
      "created": "2026-04-20T09:05:57.000Z",
      "modified": "2026-04-20T09:05:57.000Z",
      "name": "Meta and PortSwigger drive offensive security further to find what others miss",
      "description": "Meta Bug Bounty and PortSwigger have formed a partnership to help security researchers sharpen their skills, collaborate more closely, and improve vulnerability discovery. The initiative combines Meta\u2019s bug bounty program with PortSwigger\u2019s Burp Suite, reflecting a shared focus on improving both tooling and education for the global security community. \u201cBy joining forces, we\u2019re not just offering resources; we\u2019re building bridges between communities,\u201d Meta Bug Bounty said.",
      "published": "2026-04-20T08:13:30.000Z",
      "report_types": [
        "threat-report"
      ],
      "object_refs": [
        "attack-pattern--3f09fcbe-388c-433b-b018-d153f79f80de"
      ],
      "external_references": [
        {
          "source_name": "Help Net Security",
          "url": "https://www.helpnetsecurity.com/2026/04/20/meta-bug-bounty-portswigger-partnership",
          "description": "Meta and PortSwigger drive offensive security further to find what others miss"
        }
      ],
      "labels": [
        "Education"
      ]
    },
    {
      "type": "attack-pattern",
      "spec_version": "2.1",
      "id": "attack-pattern--3f09fcbe-388c-433b-b018-d153f79f80de",
      "created": "2026-04-20T09:05:57.000Z",
      "modified": "2026-04-20T09:05:57.000Z",
      "name": "Command and Scripting Interpreter",
      "external_references": [
        {
          "source_name": "mitre-attack",
          "external_id": "T1059",
          "url": "https://attack.mitre.org/techniques/T1059/"
        }
      ],
      "kill_chain_phases": [
        {
          "kill_chain_name": "mitre-attack",
          "phase_name": "execution"
        }
      ]
    }
  ]
}