Blog

Home > Blog

Blog

Browse by Category

Recent Posts

Hacker Spotlight: Interview with dkd

This week’s hacker spotlight features @dkd, a generally private hacker who was excited to share his experience!

HackerOne
Read More

Hacker Spotlight: Interview with notnaffy

Entrepreneur and hacker, @notnaffy talks about his journey in hacking through the years and his methodologies. Read this epic Q&A in this week’s hacker spotlights!

HackerOne
Read More

2020 Hacker Community Year in Review

From CTF’s to virtual live hacking events and more, check out this recap of the initiatives HackerOne hosted for the hacker community in 2020.

Jenn Eugenio
Read More

Hacker Spotlight: Interview with hazimaslam

This week’s hacker spotlight, we virtually travel to Pakistan to get to know @hazimaslam and how he hacks and his motivations to continue hacking.

HackerOne
Read More

Announcing The Hacker of The Hill


Jenn Eugenio
Read More

Hacker Spotlight: Interview with pnig0s

Detailed, meticulous and precise. @pnig0s shares his hacking style and successes from his bug bounty experience in this latest Hacker Spotlight.

HackerOne
Read More

5 Learnings From A Conversation With OP Financial Group's CISO And @mrtuxracer

On 20 January, HackerOne’s CEO, Marten Mickos, sat down for a chat with European hacker, Julien Ahrens a.k.a @mrtuxracer, and Teemu Ylhäisi, CISO at OP Financial Group. The discussion ranged from the recent SolarWinds attacks to the best way to prevent phishing. Here are our top takeaways from the webinar.

HackerOne
Read More

Hacker Spotlight: Interview with filedescriptor

“It's challenging and rewarding, and I get to help companies become more secure. It's challenging and rewarding, and I get to help companies become more secure.” Read this week’s Hacker Spotlight on filedescriptor.

HackerOne
Read More

Hacker Spotlight: Interview with samengmg

Read about @samengmg and his self-taught bug bounty experience hacking the Singaporean government and huge global corporations.

HackerOne
Read More

What Years of AWS Hacking Tells Us About Building Secure Apps

Years of AWS bug bounties have exposed SSRF vulnerabilities, misconfigurations, and dangling DNS records. What can we learn from these vulnerabilities about mitigating risk?

Jobert Abma
Read More