Skip to main content
Notification Message
Hai Agentic - Smarter AI for Faster Risk Reduction |
Learn More

User account menu

  • Login
  • Leaderboard
  • Contacted by a hacker?

Home

Main navigation

  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Programmatic, On-demand Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Why HackerOne
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
    • HackerOne for Hackers
    • Learn to hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
Get Started
Home
HackerOne

Main navigation

  • Platform
  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Programmatic, On-demand Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Why HackerOne
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
  • Researchers
    • HackerOne for Hackers
    • Learn to hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
  • Get Started
  • Login

Ethical hackers ‘hit the jackpot’ as tech groups pay for protection

Ethical hackers ‘hit the jackpot’ as tech groups pay for protection

March 28th, 2022
Financial Times
https://www.ft.com/content/b329db30-ca6e-437e-b36d-0ebc6eff39f1?FTCamp=engage/C…

Zoom awarded $1.8 million in bug bounty rewards over 2021

Zoom awarded $1.8 million in bug bounty rewards over 2021

April 2nd, 2022
ZDNet
https://www.zdnet.com/article/zoom-awards-1-8-million-in-bug-bounty-rewards-ove…
Image
Protect Critical Infrastructure from Threats
Exposure Management
How Critical Infrastructure Can be Protected from Threats
June 2nd, 2022
Accessing a major critical infrastructure network is very appealing to cybercriminals, as they can maximize...
Read Now
Image
pullrequest5ways
5 Ways I Provide Value as a PullRequest Reviewer When I Start Reviewing a New Project
May 24th, 2022
As shown in Figure 1 below, even early reviews can provide value. Catching Security Vulnerabilities...
Read Now
Image
HackerOne Blog
Offensive Security
HackerOne Announces a New Customer Pentest Setup that's More Efficient and Speeds Time to Launch
May 20th, 2022
This improved experience reduces time to launch, which is vital when your organization is up...
Read Now
Image
PubvsPri
Exposure Management
Understanding Public and Private Bug Bounties and Vulnerability Disclosure Programs
May 18th, 2022
How Are Bug Bounty Programs and Vulnerability Disclosure Programs Different? Let’s start with the similarities...
Read Now
Image
HackerOne announces PullRequest acquisition
Why HackerOne Acquired Pull Request and What It Means for Our Customers
May 3rd, 2022
Security vulnerabilities are a significant workflow disruption when discovered near the end of development. Vulnerabilities...
Read Now
Image
Stock image
Exposure Management
Announcing the Results of the 12-month DIB-VDP Pilot
May 2nd, 2022
Learn more about the DoD DIB-VDP Pilot here.
Read Now
Image
How Wix Uses HackerOne to Improve Their Cybersecurity Posture
Exposure Management
Crowdsourced Security
How Wix Improves Their Security Posture with Ethical Hackers
April 21st, 2022
Reducing risk is fundamental to Wix’s approach to cybersecurity, and as the threat landscape evolves...
Read Now
Image
AS Watson bug bounty
Crowdsourced Security
How Ethical Hackers Help AS Watson Address Digital Risk
March 19th, 2024
Learn how AS Watson's bug bounty program helps them identify and remediate digital risk.
Read Now

Pagination

  • First page
  • Previous page
  • …
  • Page 53
  • Page 54
  • Page 55
  • Page 56
  • Page 57
  • Page 58
  • Page 59
  • Page 60
  • Page 61
  • …
  • Next page
  • Last page
Home
Contacted by a hacker?
Menu 1
Company
Leadership
Careers
Partners
Newsroom
Contact Us
Menu 2
Knowledge Center
Application Security
Penetration Testing
AI Red Teaming
Hacking
Cybersecurity Attacks
CTEM
Menu 3
Resources
Blog
Documentation
Leaderboard
Partner Portal
Resources
Facebook
X
Linkedin
Instagram

Menu Bottom
Policies
Terms
Privacy
Security
Trust
Right Reserved
©2025 HackerOne All rights reserved.