Skip to main content

Ethical Hacker

Ethical hackers, pentesters, and security researchers. We explain everything you need to know about them and how they can help your organization.

HAC Cloud Security
Ethical Hacker, Vulnerability Management

How Hackers Can Strengthen Cloud Security for Applications

In this session at our 5th annual global cybersecurity conference, HackerOne’s Tim Matthews sat down with Josh Bressers, Tech Lead of Product Security...

Happy Hacker Holiday Gift Guide
Ethical Hacker

Happy Hacker Holiday Gift Guide

Looking for the perfect holiday gift for the favorite hackers in your life? Whether their interests lie in...

6 Reasons Your Security Recruiting Sucks
Ethical Hacker, Best Practices, Company Resources

6 Reasons Your Security Recruiting Sucks

As we discussed in our previous blog, the security skills shortage may not be quite as real as some industry...

Security Leads Share Bug Bounty Program Tips
Ethical Hacker, Company Resources, Best Practices

Security Leads Share Bug Bounty Program Tips

HackerOne hosted a security panel, lead by Magoo, on bug bounty programs and we want to share some key...

Improving Signal Over 10,000 Bugs
Ethical Hacker, Hacker Resources, New Features

Improving Signal Over 10,000 Bugs

HackerOne reached the milestone of 10,000 bugs fixed on the platform, and we want to take this opportunity to...

Legally Blind and Deaf - How Computer Crime Laws Silence Helpful Hackers
Ethical Hacker

Legally Blind and Deaf - How Computer Crime Laws Silence Helpful Hackers

A world wide war is being waged in which the most able-bodied soldiers are being discouraged from enlisting...

What's in a Name?
Ethical Hacker

What's in a Name?

While there are many interpretations of the word "hacker," we choose to pay homage to the original MIT hackers...

The Tale of the Privacy Pink Panther
Ethical Hacker

The Tale of the Privacy Pink Panther

Last Friday, on my way home from 31c3, a funny thing happened on my way through Charles de Gaulle airport in...

Introducing Reputation
Ethical Hacker, New Features

Introducing Reputation

One of the primary challenges when running a vulnerability coordination program is distinguishing the signal...