Image OWASP Top 10 Web Security Risks of 2017 - Flashcards March 7th, 2018 There’s no such thing as perfectly secure software. All software has vulnerabilities, and it’s up... Read Now
Image Calling All “Bureaucracy Hackers” March 5th, 2018 Lisa Wiswell, a HackerOne advisor and a principal at GRIMM cybersecurity firm, thinks the government... Read Now
Image h1-202 CTF Winners Announced (and links to write-ups) March 1st, 2018 Thanks to all of you who participated in the h1-202 CTF! We had a lot... Read Now
Image Q&A with Faye Francy: How Auto-ISAC Puts Security in the Driver’s Seat February 28th, 2023 A Q&A with Executive Director of Auto-ISAC, Faye Francy, about their work to secure the automotive industry. Read Now
Image Hacker Q&A with Shubham Gupta: Patience and Passion February 23rd, 2018 Over $25 million in bounties paid to ethical hackers all over the world. According to... Read Now
Image Hack Your Way to the White House February 16th, 2018 The h1-202 CTF is here! On March 25th, 2018, h1-202 will be happening in Washington... Read Now
Image Alexa, ask HackerOne... February 12th, 2018 From left to right: Martijn, Miray, and Tom (not pictured: Annette) A few weeks ago... Read Now
Image U.S. Senate Hearing - Data Security and Bug Bounty Programs: Lessons Learned February 6th, 2018 Today, HackerOne was invited to testify in front of the U.S. Senate Subcommittee on Consumer... Read Now
Image Updated Hacker Invitations: Hack more, hack better February 1st, 2018 Hello hackers! We’ve rolled out some changes over the past few weeks to make it... Read Now
Image Q&A with Jane Frankland: GDPR, CISOs, and Women in Cybersecurity February 7th, 2018 Jane Frankland is an award-winning entrepreneur, speaker, and consultant in cybersecurity and entrepreneurism. For more... Read Now