Image Improving Public Bug Bounty Programs with Signal Requirements March 15th, 2016 HackerOne has added two improvements that increase vulnerability report quality for public disclosure and bug... Read Now
Image Environment Is Everything, and Other Tips For Your Open Source Project March 17th, 2016 In 2014, HackerOne launched their first open source project and two years in, we have... Read Now
Image 6 Ways to Build Great Relationships with Security Teams March 24th, 2016 One of the most common questions we get from new hackers is "How can I... Read Now
Image Hacker Blogs We Love Reading March 29th, 2016 UPDATED: Please note that we updated this post on 5/5 with even more blogs our... Read Now
Image Hack the Pentagon Bug Bounty Program Launches on HackerOne March 31st, 2016 Hack the Pentagon?! On Thursday, March 31, 2016, the Department of Defense, arguably the world's... Read Now
Image You Received A Vulnerability Report, Now What? 6 Steps to Resolution April 5th, 2016 When you discover a vulnerability, fixing it is not just a matter of applying a... Read Now
Image 5 Things Top Bug Bounty Hunters Do Differently April 7th, 2016 This week, we had the pleasure of hosting 50 Belgian technology students, who were on... Read Now
Image Top 5 Most Viewed Bugs of 2016 April 15th, 2016 Public vulnerability reports are security gold - everyone benefits from the shared knowledge. There are... Read Now
Image How to Become a Successful Bug Bounty Hunter April 21st, 2016 If you ever dreamed of becoming a bounty hunter, your dreams can come true --... Read Now
Image 5 Ways to Attract Top Hackers To Your Bug Bounty Program May 2nd, 2016 Talented hackers are the key ingredient for any successful bug bounty program. They find the... Read Now