What Your Organization Gains by Understanding the Value of App Security Testing Averages
Daily and weekly agile software releases include bug fixes and security patches alongside new functionality. As a result, new vulnerabilities are...
A Guide To Subdomain Takeovers
Technical guide on how to understand, find, exploit, and report subdomain misconfigurations by EdOverflow
Advanced triggers feature launches to further improve signal
Triggers are simple but powerful tools for executing automated responses to new, incoming reports. With...
GitHub Celebrates Four Years of Bug Bounties: Q&A with VP of Security, Shawn Davenport
GitHub celebrated the fourth anniversary of its Security Bug Bounty program and released a comprehensive recap...
OWASP Top 10 Web Security Risks of 2017 - Flashcards
There’s no such thing as perfectly secure software. Learn about the top 10 web security risks of 2017 with our...
U.S. Senate Hearing - Data Security and Bug Bounty Programs: Lessons Learned
HackerOne was invited to testify in front of the U.S. Senate Subcommittee on Consumer Protection, Product...
Alex Rice and Zane Lackey Discuss Modern Security for Practitioners
Our co-founder and CTO, Alex Rice, was a recent guest on The Modern Security Series by Signal Sciences, along...
5 Hacker-Powered Trends You Need to Know About
For your quick reference, we’ve distilled the Hacker-Powered Security Report to 5 key trends that show how...
Tor Project Launches Public Bug Bounty Program | Q&A with Tor Browser Team Lead, Georg Koppen
In January 2016, the Tor Project launched its first private bug bounty program on HackerOne. Today the Tor...