Checkout this infographic for a more detailed look at stats, hacker perspectives, and highlights of our event. Be sure to checkout all of our H@cktivityCon videos here.
Checkout this infographic for a more detailed look at stats, hacker perspectives, and highlights of our event. Be sure to checkout all of our H@cktivityCon videos here.
At HackerOne, we’re always looking for talented and dedicated individuals passionate about hacking and cybersecurity. That’s why we’re thrilled to introduce one of our favorite community members,...
While a largely voluntary approach to critical infrastructure cybersecurity has led to some improvements, a general lack of mandatory requirements has too often resulted in inconsistent and...
What is Asset Inventory? The effectiveness of an ASM initiative is determined by how well the solution records the attack surface and presents the data to the organization. A best-in-class ASM...
What made you want to become an ambassador? I applied to the HackerOne ambassadors program as soon as I heard about it. In fact, I was part of the first wave of ambassadors to join! I do bug...
Check out some highlights from our most recent Live Hacking Event. These events are incredible opportunities for both hackers and programs to see critical results. See how it all turned out at...
Hacker Engagement First impressions matter! Win hackers over early on and create “anchor” hackers - program stalwarts that learn all about the target organization and keep coming back to hack...
The Ambassador World Cup 2023 is an eight-month-long, competition-driven way to build community engagement, collaboration, and ambassador brand awareness throughout the hacker community. The...
What made you want to become an ambassador? I wanted to become an ambassador mainly because I wished to create a community to exchange information to help others enter the bug bounty space. The...
HackerOne Live Hacking Events are back! We wrapped a tremendous year of events for 2022 where we saw some amazing success. Some of the most notable: Six customers partnered with us across five...
First, a shout-out to the winners at Bug Hunt! Congratulations are in order for these dedicated hackers: 1st: n1ghtmar3_24212nd: Osrafi3rd: 0x_saikat What is Bug Hunt? This is a yearly event...
With this two-part blog series, we will delve into strategies and tactics exhibited by dozens of enterprise customers over several years that will optimize the effectiveness of your bug bounty...
The Belgian government has recently announced a new Belgian law that will allow ethical hackers to hack any Belgian company without any prior permission. Historically, ethical hacking codes of...
Our conversation with Ian Carroll (Staff Security Engineer at Robinhood) spans the history of bug bounty at Robinhood, Ian’s approach to bug bounty program management, and why the hacker...
I was always intrigued about how things work on the other side of bug bounty. Well, the month of June, 22 made that possible for me when I started my day one as a Product Security Analyst with...
Why is ASM Important? Your attack surface is the sum of all entry points an attacker could use to access your systems, applications, devices, or network. For most organizations, it’s a complex...
Today's hacker RhynoraterJXoaT: Where did you first hear about hacking? What was your first exposure to it? Rhynorater: So, my first exposure to hacking was actually my neighbor. When I was...
What made you want to become an ambassador? There are several reasons why I decided to become an ambassador at HackerOne. Firstly, I am passionate about ethical hacking and bug bounty. Being an...
Vulnerability Disclosure Programs create an effective means for researchers and other users to report discovered vulnerabilities and weaknesses. Because federal agencies have a significant impact...
Today's hacker InsiderPhDJXoaT: My first question is always, "What was your first experience with hacking?" What really opened the door to you? InsiderPhD: I am a child of the '90s, and I...
The report provides a technical evaluation of key PTaaS vendor offerings in the market. A select group of seven vendors were invited to participate in this evaluation. HackerOne is positioned as a...