What is your cybersecurity need?
Protect your evolving assets.
Scale app security across the SDLC.
Build your brand and protect your customers.
Meet compliance requirements and more.
Reshaping the way companies find and fix critical vulnerabilities before they can be exploited.
Test your organization's security preparedness with HackerOne Assessment.
Establish a compliant vulnerability assessment process.
The first step in receiving and acting on vulnerabilities discovered by third-parties.
Continuous testing to secure applications that power organizations.
Highly vetted, specialized researchers with best-in-class VPN.
Enhance your hacker-powered security program with our Advisory and Triage Services.
Home > Blog
Time is not kind to the security of an organization. The longer you wait, the weaker you are. The more things drag out, the higher the risk of breach. Delays in responding to threats, incidents, and compromises mean exponential cost increases.
HackerOne reports results of its own bug bounty program for 2015, increases minimum bounty for severe vulnerabilities to $10K.
Better bug reports = better relationships = better bounties! Whether you are new to bounty programs or a bounty veteran, these tips on how to write good reports are useful for everyone!
Qualcomm is the world leader in 3G and 4G technologies helping power your smartphones, among other things, and today we’re excited to announce the launch of their invite-only bug bounty program on HackerOne.
This week, we had the pleasure of hosting 50 Belgian technology students, who were on a tour of Silicon Valley technology companies. We had the opportunity to share our experience as entrepreneurs, but mostly we discussed hacking and security because, that is what we live and breathe at HackerOne.
What were the top five most viewed public vulnerability reports on HackerOne in the second quarter of 2016? Read to find out!
Programs on HackerOne can now customize the Views in their Inbox to accommodate more advanced vulnerability disclosure workflows.
HackerOne is launching the Directory: a community-curated resource for identifying the best way to contact an organization's security team.
Life is complicated, bug bounties should not be. Here’s a comic illustrating how bug bounty programs work by Fred Chung.
You can now assign vulnerability severity utilizing the Common Vulnerability Scoring Standard (CVSS).
Great hackers never curb their curiosity. Increased recognition of their contribution is helping more companies understand that they are a valued partner, not an adversary.