Image A Guide To Subdomain Takeovers August 15th, 2018 HackerOne's Hacktivity feed — a curated feed of publicly-disclosed reports — has seen its fair... Read Now
Image Sumo Logic Looks to Hacker-Powered Pen Testing for Security and Compliance July 31st, 2018 Secrecy has been a trademark of security culture for decades. Companies like cloud-based log management... Read Now
Image Zomato’s First Anniversary with Bug Bounties: Q&A with Security Lead, Prateek Tiwari July 23rd, 2018 Headquartered in India - restaurant discovery, online ordering and table reservations platform Zomato currently operates... Read Now
Image The Hacker-Powered Security Report 2018 July 11th, 2018 "Crowdsourced security testing is rapidly approaching critical mass, and ongoing adoption and uptake by buyers... Read Now
Image H1-702 CTF Winners Announced! July 9th, 2018 Thanks to all the hackers who participated in the h1-702 2018 CTF! For the first... Read Now
Image Lawfully Hacked July 9th, 2018 The best way to prevent getting hacked is to try to get hacked. Paradoxical as... Read Now
Image The Journey to 100% Responsive Programs July 5th, 2018 Hackers, we hear you. Unresponsive programs are a drain on your time and your sanity... Read Now
Image Webinar: Learn How Hacker-Powered Pentests Give You More For Less July 3rd, 2018 Penetration tests are a fundamental part of any security apparatus, but they’re traditionally seen as... Read Now
Image Morrison & Foerster’s David Newman: How Corporate Counsel Should Approach Hacker-Powered Security July 2nd, 2018 The law firm of Morrison & Foerster has been providing cutting-edge legal advice on matters... Read Now
Image Hackers Descend on London for First Ever UK Live Hacking Event: H1-4420 June 28th, 2018 On Saturday, June 16, almost 50 hackers gathered from across the world to hack one... Read Now