Blog

Home > Blog

Blog

Browse by Category

Recent Posts

Vulnerability Disclosure Policy Basics: 5 Critical Components

Vulnerabilities are found every day by security researchers, friendly hackers, customers, academics, journalists, and tech hobbyists. Because no system is entirely free of security issues, it's important to provide an obvious way for external parties to report vulnerabilities.

Luke Tucker
Read More

Aim High...Find, Fix, Win!

It took just under a minute for hackers to report the first security vulnerability to the U.S. Air Force. Twenty-five days later when the Hack the Air Force bug bounty challenge concluded, 207 valid vulnerabilities had been discovered. Hackers will be awarded more than $130,000 for making the Air Force more secure.

HackerOne
Read More

Key Findings From The Hacker-Powered Security Report: Vulnerability Disclosure Policies (5 of 6)

The Hacker-Powered Security Report found that, despite increased bug bounty program adoption and recommendations from federal agencies, 94 percent of the top publicly-traded companies do not have known vulnerability disclosure policies (VDP).

Luke Tucker
Read More

5 Hacker-Powered Trends You Need to Know About

For your quick reference, we’ve distilled the Hacker-Powered Security Report to 5 key trends that show how white-hat hackers are shaping the world of security.

HackerOne
Read More

Key Findings From The Hacker-Powered Security Report: Bounty Payments Are Increasing (4 of 6)

As you can imagine, money talks. Better hackers — those with more experience and in-demand skills — go where the money is, and that means organizations that pay more generally get access to the best talent.

Luke Tucker
Read More

How to: Recon and Content Discovery

Recon plays a major role while hacking on a program.  Recon doesn’t always mean to find subdomains belonging to a company, it also could relate to finding out how a company is setting up its properties and what resources they are using.

HackerOne
Read More

Key Findings From The Hacker-Powered Security Report: Responsive Programs Attract Top Hackers (3 of 6)

The Hacker-Powered Security Report found that hackers are overwhelmingly attracted to the programs that are the fastest at acknowledging, validating, and resolving submitted vulnerabilities.

Luke Tucker
Read More

Faster and Better: New Bank Transfer Payment Feature for Hackers

We’re happy to announce that we’re adding Bank Transfers as a payout option to complement Paypal and Coinbase. This feature will give you the ability to get paid out in 30 different currencies to almost any country in the world.

Martijn Russchen
Read More

Hey Hackers: We’ve got your free Burp Suite Professional license right here

Burp Suite is the premier offensive hacking solution, and now when new hackers reach at least a 500 reputation on HackerOne and have a positive signal, they are eligible for 3-months free of Burp Suite Professional.

Luke Tucker
Read More

Q&A With @MalwareTechBlog

When he’s not reverse engineering malware, Marcus Hutchins (aka @MalwareTechBlog) can be found surfing, partying, or traveling. That’s to be expected for any typical 22-year-old, except for the part where he stopped the WannaCry malware outbreak. This is part of his story...

Luke Tucker
Read More