HackerOne CEO joins Node.js Foundation Board
Open source models are the backbone of the modern internet. Therefore, it’s our duty to defend them. That’s why HackerOne has joined the Node.js Foundation…
Open source models are the backbone of the modern internet. Therefore, it’s our duty to defend them. That’s why HackerOne has joined the Node.js Foundation…
Traditional penetration testing is an important tool in your appsec strategy toolbox. Compliance requires it. Your CIO understands it. Your team is accustomed to it.…
Great news for U.S. citizens! Over 3,000 valid security vulnerabilities have been resolved with the U.S. Department of Defense’s “Hack the Pentagon” hacker-powered security program.…
Want to win an all expenses paid trip to New York City to hack against HackerOne 1337 and a chance to earn up to $100,000…
Hello hackers! Thanks to all of you who participated in our first ever h1-212 CTF! We had a lot of fun building it and it…
The attention being given to vulnerability disclosure policies (VDP) in the past year has increased dramatically. It might be the latest high-profile breach that sparks…
Data breaches in information security have become an inescapable reality. A common inquiry we receive here at HackerOne is for guidance on how to most…
When the European General Data Protection Regulation (GDPR) takes effect on May 25, 2018, every organization that collects information on European Union (EU) citizens will…
Before you propose a bug bounty program to your organization, you need a comprehensive plan. That’s just one of the many takeaways offered on a…
In the League of Legends world, your nexus is protected from outside threats by a strong team of diverse champions. It’s similar to how you…
A lot could go wrong on the internet! A clever attacker can with ease gather all the intelligence he/she needs in order to conduct a…
Like many organizations, AlienVault had set up a vulnerability disclosure policy for any bugs found on their website. If someone found a vulnerability, all they…