Category: Mix
One of the most common questions we get from new hackers is “How can I get along better with security…
UPDATED: Please note that we updated this post on 5/5 with even more blogs our hackers suggested. Thank you! Hackers…
Hack the Pentagon?! On Thursday, March 31, 2016, the Department of Defense, arguably the world’s most powerful organization, announced it…
When you discover a vulnerability, fixing it is not just a matter of applying a quick patch to solve the…
This week, we had the pleasure of hosting 50 Belgian technology students, who were on a tour of Silicon Valley…
Hackers Report The Most Vulnerabilities In 2022 To Keep The Platform Secure We looked at how our program performed from…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…
Public vulnerability reports are security gold – everyone benefits from the shared knowledge. There are over 1600 publicly disclosed vulnerability…
If you ever dreamed of becoming a bounty hunter, your dreams can come true — without changing your name to…
Talented hackers are the key ingredient for any successful bug bounty program. They find the most interested and severe bugs,…
Linus’s Law states, “given enough eyeballs, all bugs are shallow,” meaning broader and deeper testing populations find issues faster. This…
Only with transparent communication do hackers and security teams find that win-win. With this goal in mind, we are pleased…








