Blog Posts

The latest & greatest from the HackerOne blog.

  • Snap’s Security Team on Nearly 6 Years of Collaborating with Hackers

    Snap’s Security Team on Nearly 6 Years of Collaborating with Hackers

    As a popular camera and messaging platform, Snapchat is responsible for properly handling data for 249 million users daily. The Snap bug bounty program launched in January 2015 to encourage...

    Read Article
  • Organizations Paid Hackers $23.5 Million for These 10 Vulnerabilities in One Year

    Organizations Paid Hackers $23.5 Million for These 10 Vulnerabilities in One Year

    In times of uncertainty, security becomes an ever more pressing priority. The stakes are high: organizations are more reliant on technology than ever and anyone relying on technology can lose...

    Read Article
  • Hacker Spotlight: Interview with MrTuxRacer

    Hacker Spotlight: Interview with MrTuxRacer

    Julien Ahrens, aka @mrtuxracer, comes from a small town in northern Germany and started hacking at 15, when he had to creatively solve the problem of not being able to play Starcraft 1. After...

    Read Article
  • HackerOne Expands Integrations Ecosystem to Connect and Defend Customers

    HackerOne Expands Integrations Ecosystem to Connect and Defend Customers

    Revealed at Security@, HackerOne adds PagerDuty, ServiceNow, Splunk, SumoLogic to advance workflows HackerOne, the world’s most trusted hacker-powered security platform, today introduced a set of...

    Read Article
  • Hacker Spotlight: Interview with inhibitor181

    Hacker Spotlight: Interview with inhibitor181

    Cosmin (@inhibitor181) was born and raised in Romania but has been living with his wife and two dogs in Germany for the past six years.  When he was a university student, he decided to attend the...

    Read Article
  • Hacker Spotlight: Interview with arneswinnen

    Hacker Spotlight: Interview with arneswinnen

    @arnswinnen started hacking when he was 14-years-old but his bug bounty career didn’t officially begin until five years ago, when he hacked on an Instagram program while on vacation with his...

    Read Article
  • HackerOne Integrates with ServiceNow to Streamline Vulnerability Lifecycle Management

    HackerOne Integrates with ServiceNow to Streamline Vulnerability Lifecycle Management

    We’re excited to announce our integration with ServiceNow Incident Management. This integration allows customers to escalate vulnerability reports with ServiceNow incidents and synchronize any...

    Read Article
  • Hacker Spotlight: Interview with albinowax

    Hacker Spotlight: Interview with albinowax

    James ‘@albinowax’ Kettle is well-known in the hacking community for his creativity and expertise, despite only taking up hacking after becoming bored of playing Counter-Strike in college....

    Read Article
  • AT&T Celebrates $1 Million Awarded to Hackers in One Year

    AT&T Celebrates $1 Million Awarded to Hackers in One Year

    AT&T Communications recently celebrated its first anniversary on HackerOne, passing $1 million in payouts to more than 850 researchers worldwide. The HackerOne program is a progression from...

    Read Article
  • NIST Overhauls “Security and Privacy Controls” Publication - Here’s What You Need to Know

    NIST Overhauls “Security and Privacy Controls” Publication - Here’s What You Need to Know

    Back in 2005, the Computer Security Resource Center (CRSC) published NIST 800-53: the “Security and Privacy Controls for Information Systems and Organizations” publication. This “Special...

    Read Article
  • Hacker Spotlight: Interview with ajxchapman

    Hacker Spotlight: Interview with ajxchapman

    Alex Chapman, otherwise known as @ajxchapman, has been a bug bounty hunter for over a decade after starting in the field as a pentester for Deloitte in 2007. Alex says being a full-time bounty...

    Read Article
  • Introducing the 4th Annual Hacker-Powered Security Report

    Introducing the 4th Annual Hacker-Powered Security Report

    This is a time of unprecedented challenges. We face never-before- seen threats in the digital and physical worlds. If this past year has taught us anything, it is this: we need to leave behind our...

    Read Article
  • H1-2010 FAQ’s

    H1-2010 FAQ’s

    H1-2010 FAQ’s Important Links: RegistrationThe Paranoids Event OverviewThe Paranoids Event Insights Contact h1-2010@hackerone.com for any questions! We are so excited to have you participate in...

    Read Article
  • Hacker Spotlight: Interview with bitK

    Hacker Spotlight: Interview with bitK

    French hacker Lucas Philippe, or @bitK on HackerOne, loves solving puzzles and bug hunting. He’s a member of multiple CTF (Capture The Flag) groups including @HexpressoCTF and @FlatNetworkOrg and...

    Read Article
  • Vulnerability Disclosure is Now Mandatory for Federal Agencies - Here's How to Make it Happen

    Federal agencies exist to protect and support the nation and its citizens. Despite their elaborate processes to reduce cyber risk, many American agencies lack modern mechanisms to help identify...

    Read Article
  • Smartsheet Celebrates One Year with HackerOne

    Smartsheet Celebrates One Year with HackerOne

    As a collaboration and dynamic work management platform, Smartsheet (NYSE:SMAR) is tasked with protecting some of their customers' most sensitive assets while also releasing new capabilities to...

    Read Article
  • HackerOne Rolls Out Pentest Review System for Customers and Pentesters

    HackerOne Rolls Out Pentest Review System for Customers and Pentesters

    Traditional pentesting suffers from a persistent issue: a lack of transparency into the pentest process itself and what’s considered successful. Is success measured in quality of vulnerability...

    Read Article
  • Hacker Spotlight: Interview with honoki

    Hacker Spotlight: Interview with honoki

    Hailing from Brussels, Belgium, Pieter (AKA @honoki on HackerOne) comes from an extensive business and cybersecurity background. He has over ten years of experience breaking and securing IT...

    Read Article
  • Are Election Hacking Fears Driving Voters To The Polls?

    Are Election Hacking Fears Driving Voters To The Polls?

    If people fear that the American electoral infrastructure could be hacked, will they withhold their votes in November? Not according to research commissioned by HackerOne ahead of the 2018 midterm...

    Read Article
  • Hacker Spotlight: Interview with dki

    Hacker Spotlight: Interview with dki

    Dawn Isabel, otherwise known as @dki, is an inspiring iOS hacking expert. She happens to be the kind of person who sees puzzles all around her and finds joy in solving them. She says it’s hugely...

    Read Article
  • loading
    Loading More...