Blog

Home > Blog > bounty

bounty

Browse by Category

Recent Posts

One Month of Learnings from Flo Health’s Bug Bounty Program: A Q&A with CISO, Leo Cunningham

The world’s most popular women’s health app, Flo Health, is responsible for the sensitive health data of 40 million women. With that much PII under their purview, Flo Health’s CISO knew that enabling his security team with the most advanced security testing methods was of the utmost importance to brand trust and user loyalty. 

HackerOne
Read More

What Are Bug Bounties? How Do They Work? [With Examples]

Looking for bug bounty examples? We’ll explain what bug bounties are, and show you how they work step-by-step using examples of actual bug bounties.

HackerOne
Read More

How HackerOne Positively Influences Zebra’s Software Development Life Cycle


HackerOne
Read More

Bug Bounty vs. CTF [Understanding Differences & Benefits]

Trying to understand the difference between a bug bounty vs. CTF? We explain the differences, the similarities, and the benefits of each.

HackerOne
Read More

What is Vulnerability Scanning? [And How to Do It Right]

Vulnerability scanning helps companies identify possible ways an attacker could exploit vulnerabilities that might cause outages, allow unauthorized network access, or acquisition of privileged information. Outdated software products, unpatched operating systems, and misconfigured hardware often lead to vulnerabilities.

HackerOne
Read More

Citrix’s Hacker-Powered Security Growth Plan: Q&A with Abhijith Chandrashekar

We recently sat down with Abhijith Chandrashekar, PSIRT Manager at Citrix, to discuss why Citrix continues to expand their bug bounty program and learn about their cloud security and scope expansion plans. Read on to see what he had to say.

HackerOne
Read More

HackerOne in DevSecOps 

Hundreds of HackerOne customers use our platform in their application security processes. For the most part, these are organizations using bug bounty to find vulnerabilities in their deployed applications. But there is so much more that we can do for development teams

Tim Matthews
Read More

How Digital Transformation Changes An Organization's Security Challenges

Last week, HackerOne joined WhiteSource, AWS, and IGT for a roundtable discussion about the new security challenges of digital transformation. The panel discussed cloud security, software supply chain security, and vulnerability disclosure programs as examples of proactive approaches organizations can take to mitigate their risk.

HackerOne
Read More

So This Is How They Tell Me The World Ends?

I was still digesting last week’s fascinating roundtable with Nicole Perlroth, cybersecurity journalist and author of This Is How They Tell Me The World Ends, when the news broke that the US’s biggest fuel pipeline had been taken out by a ransomware attack. Nicole’s closing prediction that cyber criminals, emboldened by their success in targeting hospitals with ransomware, would move onto other critical infrastructure, was coming true before my eyes. 

Alex Rice
Read More

What To Do When You Don’t Know You’ve Been Compromised

On World Password Day, I’m not going to talk about passwords. At the end of last year, HackerOne ran an exclusive campaign with a select group of hackers in which we challenged them to look for information exposures for 11 customers. The data found by the hackers included everything from passwords and authentication tokens to sensitive documents. No matter how secure your passwords are, your data is out there in different clouds and across various third-party vendors — it's only a matter of time before a leak puts your brand at risk.

Michiel Prins
Read More