Skip to main content
Notification Message
Hai Agentic - Smarter AI for Faster Risk Reduction |
Learn More

User account menu

  • Login
  • Leaderboard
  • Contacted by a hacker?

Home

Main navigation

  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Programmatic, On-demand Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Why HackerOne
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
    • HackerOne for Hackers
    • Learn to hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
Get Started
Home
HackerOne

Main navigation

  • Platform
  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Programmatic, On-demand Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Why HackerOne
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
  • Researchers
    • HackerOne for Hackers
    • Learn to hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
  • Get Started
  • Login

All
AI
Cloud Security
Code Security
Crowdsourced Security
Culture & Talent
Defense in Depth
From the CEO
HackerOne News
Offensive Security
Public Policy
Return on Mitigation
Security Compliance
Security Research
Exposure Management
Image
Announcing the PlayStation Bug Bounty Program
Crowdsourced Security
Announcing the PlayStation Bug Bounty Program
June 24th, 2020
This guest post is authored by Geoff Norton, Senior Director Software Engineering at PlayStation, and...
Read Now
Image
Scaling & Prioritizing Product Security with Zendesk
Crowdsourced Security
Scaling & Prioritizing Product Security with Zendesk
June 18th, 2020
Zendesk, Inc. (NYSE: ZEN) is one of the fastest-growing customer support platforms in the world...
Read Now
Image
PayPal on Creating Strong Relationships with Security Researchers
Crowdsourced Security
PayPal on Creating Strong Relationships with Security Researchers
May 12th, 2020
This blog post was written and contributed by Information Security Engineer, Ray Duran, on behalf...
Read Now
Image
Shopify Celebrates 5 Years on HackerOne
Exposure Management
Crowdsourced Security
Shopify Celebrates 5 Years on HackerOne
May 5th, 2020
Five years ago, Shopify’s small but mighty security team began their hacker-powered security journey with...
Read Now
Image
Slack Increases Bounty Minimums For the Next 90 Days
Crowdsourced Security
Slack Increases Bounty Minimums For the Next 90 Days
May 1st, 2020
This blog post was contributed by Slack Staff Technical Program Manager Branden Jordan. Given the...
Read Now
Image
LINE Security Bug Bounty Program Report 2019
Crowdsourced Security
LINE Security Bug Bounty Program Report 2019
March 2nd, 2020
This guest blog post was authored by Robin Lunde from the LINE Security team and...
Read Now
Image
Hyatt Celebrates its First Anniversary on HackerOne
Exposure Management
Crowdsourced Security
Hyatt Celebrates its First Anniversary on HackerOne
February 18th, 2020
After becoming the first hospitality brand to launch a public bug bounty program, Hyatt recently...
Read Now
Image
Gitlab Celebrates $1 Million in Bounties Milestone
Exposure Management
Crowdsourced Security
GitLab Celebrates Awarding $1 Million in Bounties to Hackers on HackerOne
January 14th, 2020
Not every bug bounty program is built the same. Today, GitLab announced that they have...
Read Now
Image
HackerOne Launches Bug Bounty Program for Kubernetes
Crowdsourced Security
HackerOne Launches Bug Bounty Program for Kubernetes
January 14th, 2020
The Kubernetes bug bounty program was announced today, after months of running in a ‘beta’...
Read Now

Pagination

  • First page
  • Previous page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Page 8
Home
Contacted by a hacker?
Menu 1
Company
Leadership
Careers
Partners
Newsroom
Contact Us
Menu 2
Knowledge Center
Application Security
Penetration Testing
AI Red Teaming
Hacking
Cybersecurity Attacks
CTEM
Menu 3
Resources
Blog
Documentation
Leaderboard
Partner Portal
Resources
Facebook
X
Linkedin
Instagram

Menu Bottom
Policies
Terms
Privacy
Security
Trust
Right Reserved
©2025 HackerOne All rights reserved.