Jack Cable is a security researcher and student at Stanford University, currently a Security Architect at Krebs Stamos Group and a researcher with the Stanford Empirical Security Research Group. Jack also works as a hacker at the Defense Digital Service.
Jack joined the Defense Digital Service out of high school, where he helped run the Hack the Pentagon bug bounty portfolio, advised on the next iteration of the DoD Vulnerability Disclosure Program, and built innovative cybersecurity assessment tools.
Jack is also a top-ranked bug bounty hunter, having identified over 350 vulnerabilities in companies including Google, Facebook, Uber, Yahoo, and the U.S. Department of Defense. He is ranked within the top 100 hackers all-time on HackerOne.
Led development and deployment of CISA's first passive, opt-out vulnerability scanning program with Crossfeed, assessing all 50 states and over 2,500 counties ahead of the 2020 election.
Discovered a temporary workaround to a nascent ransomware strain, saving 50 victims $27,000 and leading to recognition from the U.S. Secretary of Homeland Security.
Organized a sign-on letter reaffirming the crucial role of security research in response to a Supreme Court Amicus Brief, with over 50 signatories including Congressman Jim Langevin. The letter was cited in the petitioner's reply brief to the Court.
Helped organize the Hack the Marine Corps bug bounty program, which culminated in a briefing demonstrating the discovered vulnerabilities to thirty 3 and 4-star Marine generals.