Category: Mix
With hacker-powered security, it’s critical to open and maintain a line of communication with the hackers who are working to…
To learn more about how legal teams and federal enforcers view hacker-powered security, we invited Megan Brown, partner, and Matthew…
In January 2016, the Tor Project launched its first private bug bounty program on HackerOne. Today the Tor Project announced…
We are glad to announce our new functionality for defining Scope! HackerOne’s Vulnerability Taxonomy now includes Severity, Weakness type, and…
When he’s not reverse engineering malware, Marcus Hutchins (aka @MalwareTechBlog) can be found surfing, partying, or traveling. That’s to be…
Listen up new and aspiring hackers, we’ve teamed up with our friends at PortSwigger to offer free 90-day licenses for…
When hackers provide value, from simply disclosing a vulnerability to doing the deep research required to find a critical bug,…
Hackers, we have some great news to share! We’re happy to announce that we’re adding Bank Transfers as a payout…
Intro Recon plays a major role while hacking on a program. Recon doesn’t always mean to find subdomains belonging to…
Our Hacker-Powered Security Report is so chock-full of compelling insights, interesting tidbits, and surprising stats that we decided to distill…
As mentioned in our last post of this series, when hackers provide value, they appreciate thoughtful engagement with the organization…
The Hacker-Powered Security Report examines the largest dataset of more than 800 hacker-powered security programs, compiles learnings from application security…










