Blog

Home > Blog

Blog

Browse by Category

Recent Posts

6 Ways to Build Great Relationships with Security Teams

One of the most common questions we get from hackers is "How can I get along better with bounty admins or security teams?" Here are general guidelines to help maximize your interaction with those on the other side of the security@ inbox.

HackerOne
Read More

Top Vulnerability Reports of Third Quarter, 2016

Great hackers write great reports that others want to read. See the top ones from last quarter.

HackerOne
Read More

Disclosure Assistance Refresh

Ever stumbled upon a vulnerability, but had no idea how to share it with the affected organization? HackerOne can help! We’ve blogged about “Disclosure Assistance” before, but we wanted to talk about it again, as there have been some changes.

HackerOne
Read More

411 for Hackers: Disclosure Assistance

HackerOne introduces Disclosure Assistance to help hackers reach organizations that don't have official vulnerability reporting processes.

HackerOne
Read More

Hack The World 2016: The Final Countdown

The Hack the World bug bounty contest concludes on September 19th 2016. Get your reports in now!

HackerOne
Read More

Is Public Disclosure Right For You?

Public programs on HackerOne may publicly disclose vulnerabilities. Here’s how and why so many companies choose to add to body of security knowledge and help enable a safer Internet.

HackerOne
Read More

The Tale of the Privacy Pink Panther

Last Friday, on my way home from 31c3, a funny thing happened on my way through Charles de Gaulle airport in Paris: I was required by a security agent to not only power up, but also type in my password to unlock my laptop in order to board my flight.

HackerOne
Read More

Hacker Herding - Bug Bounty Tips from Sky Betting & Gaming

Sky Betting & Gaming knows a few things about running a bug bounty program. They recently launched their own bug bounty program and shared some tips.

HackerOne
Read More

Bug Bounty or Bust! Crafting Your Security Page

Here are our top five rules for creating an excellent bug bounty security page. Outlining a crystal clear scope helps hackers know what is (and is not!) going to net them a bounty. Transparency between hackers and security teams is vital to a successful bug bounty program.

HackerOne
Read More

Environment Is Everything, and Other Tips For Your Open Source Project

One of the most important things to be successful is creating a friendly and open environment, being responsive on issues and pull requests, and making time to manage the workload. Open source projects don't start as a community, but you can build one.

HackerOne
Read More