New hacking forum leaks data of 478,000 RaidForums members
A database for the notorious RaidForums hacking forums has been leaked online, allowing threat actors and security researchers insight into the people who frequented the…
A database for the notorious RaidForums hacking forums has been leaked online, allowing threat actors and security researchers insight into the people who frequented the…
Pidgey from Pokemon Go looking all mean on the street In case you don’t have time to read three months of bug reports, here are…
While hunting for bug bounties, attack surface plays a major role. Hacking on mobile adds more juicy attack surface and increases your likelihood of finding…
High quality reports result in higher bounties and happier security teams. The best vulnerability reports provide security teams with all the information needed to verify…
Hello friends, and welcome to HackerOne’s first edition of “Fact or Fiction,” where we review shows and talk about how realistic (or not!) they are.…
Today, we are excited to share HackerOne’s 2016 Bug Bounty Hacker Report. Bug bounty programs are flourishing, but without a robust and skilled hacker community…
The HackerOne founders in their previous company. We’ve seen phenomenal participation in the Hack The World 2016 contest since we launched it in July. We…
Welcome to HackerOne’s second edition of “Fact or Fiction,” where we review hacking entertainment and discuss how realistic (or not!) they are. For this blog…
The first week of your bounty program can be the most critical. The decisions you make around bounties, how long it takes to reply to…
In February 2023, JPCERT/CC confirmed malware attacks on routers in Japan, specifically targeting Linux routers with a new Golang RAT known as GobRAT. The attacker…
The more you let friendly hackers hack you, the less the criminals can hack you. Bug bounty programs are revolutionizing the security industry and becoming…
With your on-premise security solution comprising hardware, software, signatures, rules, and even machine learning, you may think your applications are fully protected. How do you…