Blog Posts

The latest & greatest from the HackerOne blog.

  • Hacker Spotlight: Interview with Ziot

    Hacker Spotlight: Interview with Ziot

    Ziot, otherwise known as Brett Buerhaus, lives and breathes cybersecurity. When he’s not working as a Security Engineer for Blizzard Entertainment, he’s solving challenges and drafting write-ups....

    Read Article
  • Human vs. Machine: Three-Part Virtual Series on the Human Element of AppSec

    Human vs. Machine: Three-Part Virtual Series on the Human Element of AppSec

    In 2011, when IBM’s Watson supercomputer went up against ‘Jeopardy’ icon Ken Jennings, the world watched as a battle of man vs. machine concluded in an impressive win for Watson. It wasn’t simply...

    Read Article
  • Securing video streaming in sub-Saharan Africa

    Securing video streaming in sub-Saharan Africa

    Guest post by Jan Spitalnik, CTO of subscription video on demand service, Showmax Maintaining a video streaming service across the whole of Africa is challenge enough, without the added pressure...

    Read Article
  • Hacker Spotlight: Interview with cdl

    Hacker Spotlight: Interview with cdl

    Corben Leo, popularly known as “cdl”, is currently a Computer Science student at Dakota State University but he’s been a security researcher and a bug bounty hunter for years. He’s attended a...

    Read Article
  • Security@ 2020 Call for Speakers is Open

    Security@ 2020 Call for Speakers is Open

    HackerOne’s global Security@ conference is back for its fourth year. This year’s virtual event will take place October 20-22, 2020. Today, we’ve opened our call for speakers! Are you looking for a...

    Read Article
  • Costa Coffee prepares for global expansion with bug bounty program

    Costa Coffee prepares for global expansion with bug bounty program

    When thinking about bug bounty customers, most people's minds will most likely go to huge tech brands long before they go to their local coffee chain. Customer loyalty is serious business though...

    Read Article
  • A Warm Welcome To Our New SVP of Customer Success

    A Warm Welcome To Our New SVP of Customer Success

    Hello HackerOne community! I’m Amanda Berger and I’m thrilled to be joining the HackerOne team and begin empowering our global customers to build a safer internet. I’m no stranger to security....

    Read Article
  • Hacker Spotlight: Interview with zlz

    Hacker Spotlight: Interview with zlz

    A Security Consultant at his own business (17Security), a student at the University of Nebraska Omaha, and a seasoned bug bounty hunter, Sam Curry, aka “zlz”, was only 12-years-old when he started...

    Read Article
  • Pentesting basics video series launched on Hacker101

    Pentesting basics video series launched on Hacker101

    What is pentesting? What is the OWASP Top 10? How is pentesting different than bug bounty? How can I take bug bounty skills I’ve learned and apply them to my day job? I want to upskill my...

    Read Article
  • Cybersecurity Vendor Consolidation: Securing More with Less

    Cybersecurity Vendor Consolidation: Securing More with Less

    Remember those days, pre-pandemic, when you thought your security scope was complex? But now, with employees at home, new video and collaboration apps being rolled into daily workflows, and less...

    Read Article
  • Hyatt Launches Public Bug Bounty Program with Hackerone

    Read Article
  • Visma’s Ioana Piroska on Securing the Development Lifecycle Through Bug Bounties

    Visma’s Ioana Piroska on Securing the Development Lifecycle Through Bug Bounties

    Visma is a leading business solution provider in Northern Europe, focusing on business optimization and management tools in a variety of industries. The company’s nearly one million customers...

    Read Article
  • Hacker Spotlight: Interview with hogarth45

    Hacker Spotlight: Interview with hogarth45

    Hailing from Fargo, North Dakota, hogarth45 — known offline as Jesse Clark — joined HackerOne in December 2014. In the past six years, he’s reported more than 640 vulnerabilities and some 30+...

    Read Article
  • Pentesting Beyond Compliance: A Tool to Improve Your Security Posture

    Pentesting Beyond Compliance: A Tool to Improve Your Security Posture

    Penetration testing is a good baseline for evaluating system vulnerabilities and an industry best practice that supports routine security hygiene. Many companies also use traditional pentests to...

    Read Article
  • Meet APAC Hacker @jin0ne: A Next Generation Cyber Defender

    Meet APAC Hacker @jin0ne: A Next Generation Cyber Defender

    Asia continues to be a growing international hub for talented hackers who want to do good. Last year, hackers around the world earned over $40 million in bounties on the HackerOne platform, and...

    Read Article
  • Hacker Spotlight: Interview with rijalrojan

    Hacker Spotlight: Interview with rijalrojan

    rijalrojan is a long time bug bounty hunter, student and CTF creator. He is constantly expanding his knowledge whether that’s at California State University Fullerton getting his Computer Science...

    Read Article
  • Hacker Spotlight: Interview with meals

    Hacker Spotlight: Interview with meals

    @meals has been hacking since September 2014 and has uncovered 926 valid vulnerabilities on HackerOne, ranking 6th on the HackerOne all-time leaderboard. He has an extensive background in...

    Read Article
  • What Juneteenth Means at HackerOne

    What Juneteenth Means at HackerOne

    This year, the Juneteenth holiday gained wider global recognition. At HackerOne, we kicked off our inaugural Juneteenth celebration with a day of learning, reflection and unified commitment to...

    Read Article
  • Reputation, Signal & Impact Calculation Enhancements

    Reputation, Signal & Impact Calculation Enhancements

    We’re pleased to announce some enhancements to how Reputation, Signal, and Impact are calculated. These changes will be applied going forward (not applied retroactively) and align with requests...

    Read Article
  • Mail.ru Group pays out over $1 million in bounties

    Mail.ru Group pays out over $1 million in bounties

    “It’s not worth building a fence if it can be bypassed just two steps to the side” Mail.ru Group is a bug bounty veteran; with a program that spans 6 years, paying out over $1 million in bounties...

    Read Article
  • loading
    Loading More...