Category: Mix

Slack Increases Bounty Minimums For the Next 90 Days
31
May
2023

6 Ways to Build Great Relationships with Security Teams

One of the most common questions we get from new hackers is “How can I get along better with security…

Breaking Down the Benefits of Hacker-Powered Pen Tests
31
May
2023

Hacker Blogs We Love Reading

UPDATED: Please note that we updated this post on 5/5 with even more blogs our hackers suggested. Thank you! Hackers…

31
May
2023

Hack the Pentagon Bug Bounty Program Launches on HackerOne

Hack the Pentagon?! On Thursday, March 31, 2016, the Department of Defense, arguably the world’s most powerful organization, announced it…

ASUS Vulnerability Disclosure Déjà vu
31
May
2023

You Received A Vulnerability Report, Now What? 6 Steps to Resolution

When you discover a vulnerability, fixing it is not just a matter of applying a quick patch to solve the…

Security by the People: Announcing HackerOne’s FedRAMP Authorization
31
May
2023

5 Things Top Bug Bounty Hunters Do Differently

This week, we had the pleasure of hosting 50 Belgian technology students, who were on a tour of Silicon Valley…

Hackerone logo
31
May
2023

A Year In HackerOne’s Bug Bounty Program

Hackers Report The Most Vulnerabilities In 2022 To Keep The Platform Secure We looked at how our program performed from…

Bug Bytes #201 – Path Traversal, Prompt Injection, and GitHub Actions
31
May
2023

Bug Bytes #202 – CAIDO, Finding your first bug, and OAuth

Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…

How Federal Agencies Use Vulnerability Disclosure Policies to Level Up Security
31
May
2023

Top 5 Most Viewed Bugs of 2016

Public vulnerability reports are security gold – everyone benefits from the shared knowledge. There are over 1600 publicly disclosed vulnerability…

ASUS Vulnerability Disclosure Déjà vu
31
May
2023

Bug Bounty – How To Earn A Living

If you ever dreamed of becoming a bounty hunter, your dreams can come true — without changing your name to…

ASUS Vulnerability Disclosure Déjà vu
31
May
2023

5 Ways to Attract Top Hackers To Your Bug Bounty Program

Talented hackers are the key ingredient for any successful bug bounty program. They find the most interested and severe bugs,…

Hackerone logo
31
May
2023

The HackerOne Success Index – Hacker Breadth and Depth

Linus’s Law states, “given enough eyeballs, all bugs are shallow,” meaning broader and deeper testing populations find issues faster. This…

31
May
2023

Vulnerability Program Metrics – Better Track Your Bug Bounty Program Progress

Only with transparent communication do hackers and security teams find that win-win. With this goal in mind, we are pleased…