Image Introducing the Hacker101 CTF September 10, 2018 Hacker101 is getting something brand new: our own Capture The Flag! For those who are... Read Now
Image Highlights of New York’s Cybersecurity Regulation 23 NYCRR Part 500 September 4, 2018 September 4, 2018 - Eighteen month transitional period ends. Covered Entities are required to be... Read Now
Image Hacker Q&A with Matthew Bryant: Good Artists Copy, Great Artists Steal August 31, 2018 “Seeing an exploit without understanding how any of it works felt like witnessing someone doing... Read Now
Image What is a Responsible Disclosure Policy and Why You Need One August 30, 2018 Bug bounty programs may capture the majority of headlines in hacker-powered security today, but organizations... Read Now
Image 7 Common Security Pitfalls to Avoid When Migrating to the Cloud August 27, 2018 So you want to move to the cloud. It’s okay. You’re not alone. 96 percent... Read Now
Image 118 Fascinating Facts from HackerOne’s Hacker-Powered Security Report 2018 August 27, 2018 Another year, another Hacker-Powered Security Report! We pulled out 100 of the report’s top facts—and... Read Now
Image Oath Bug Bounty Program Update: $1M in payouts and expansion of the program August 23, 2018 This blog was written by Oath CISO and Paranoid in Chief Chris Nims and originally... Read Now
Image Improve Credential Sharing with Hacker Email Aliases August 16, 2018 Starting today, all existing and new hackers get a personalized email alias tied to their... Read Now
Image Software Vulnerability Disclosure in Europe: Summary and Key Highlights of the European Parliament CEPS Task Force Report August 14, 2018 In the autumn of 2017, the Centre for European Policy Studies (CEPS), a European Union... Read Now
Image A Guide To Subdomain Takeovers August 15, 2018 HackerOne's Hacktivity feed — a curated feed of publicly-disclosed reports — has seen its fair... Read Now