FOR HACKERS
Hacker Community Blog
At HackerOne, our Community is our core. In this space, we cover all Community matters, whether you are a security researcher, pentester, or exclusive bug bounty hacker - the Hacker Community blog space is where you can find all relevant announcements, highlights, support materials and technical content directed for our hackers or written by our hackers!
OWASP Top 10: The Risk of Cryptographic Failures
Cryptographic failures: what are they and why are they considered so concerning by the OWASP Top 10?
Community Blogs

Ethical considerations of access to the HackerOne community
May 4th, 2017
Since its founding, HackerOne has been on a mission to empower the world to build a safer internet. HackerOne...

Announcing the Largest DoD Bug Bounty Challenge Ever: Hack the Air Force
April 26th, 2017
The Air Force is asking hackers to take their best shot following the success of Hack the Pentagon and Hack...

H1-415 Live Hacking Event Delivers to Customers, Community, and Hackers
March 20th, 2017
Just a few short weeks ago, an elite group of hackers were at it again, spending a day finding bugs for Airbnb...

Introducing CWE-based Weaknesses
March 16th, 2017
Letting go is hard. Today we say goodbye to the original 18 vulnerability types on HackerOne. They’ve been...

HackerOne Professional Free For Open Source Projects
March 2nd, 2017
Here at HackerOne, open source runs through our veins. Our company, product, and approach is built-on...

How2Hack - Get Started Hacking Mobile
August 30th, 2016
While hunting for bug bounties, attack surface plays a major role. Hacking on mobile adds more juicy attack...