Image Environment Is Everything, and Other Tips For Your Open Source Project March 17, 2016 In 2014, HackerOne launched their first open source project and two years in, we have... Read Now
Image 6 Ways to Build Great Relationships with Security Teams March 24, 2016 One of the most common questions we get from new hackers is "How can I... Read Now
Image Hacker Blogs We Love Reading March 29, 2016 UPDATED: Please note that we updated this post on 5/5 with even more blogs our... Read Now
Image Hack the Pentagon Bug Bounty Program Launches on HackerOne March 31, 2016 Hack the Pentagon?! On Thursday, March 31, 2016, the Department of Defense, arguably the world's... Read Now
Image You Received A Vulnerability Report, Now What? 6 Steps to Resolution April 5, 2016 When you discover a vulnerability, fixing it is not just a matter of applying a... Read Now
Image 5 Things Top Bug Bounty Hunters Do Differently April 7, 2016 This week, we had the pleasure of hosting 50 Belgian technology students, who were on... Read Now
Image Top 5 Most Viewed Bugs of 2016 April 15, 2016 Public vulnerability reports are security gold - everyone benefits from the shared knowledge. There are... Read Now
Image How to Become a Successful Bug Bounty Hunter April 21, 2016 If you ever dreamed of becoming a bounty hunter, your dreams can come true --... Read Now
Image 5 Ways to Attract Top Hackers To Your Bug Bounty Program May 2, 2016 Talented hackers are the key ingredient for any successful bug bounty program. They find the... Read Now
Image The HackerOne Success Index - Hacker Breadth and Depth May 5, 2016 Linus’s Law states, “given enough eyeballs, all bugs are shallow,” meaning broader and deeper testing... Read Now