Category: Mix

Slack Increases Bounty Minimums For the Next 90 Days
26
May
2023

Faster and Better: New Bank Transfer Payment Feature for Hackers

Hackers, we have some great news to share! We’re happy to announce that we’re adding Bank Transfers as a payout…

h1-2006 CTF | HackerOne
26
May
2023

How to: Recon and Content Discovery

Intro Recon plays a major role while hacking on a program.  Recon doesn’t always mean to find subdomains belonging to…

What to Look For in a Penetration Testing Company
26
May
2023

Security Risk Assessment Report – Key Facts

Our Hacker-Powered Security Report is so chock-full of compelling insights, interesting tidbits, and surprising stats that we decided to distill…

Q&A with HackerOne’s VP of Customer Success Jeff McBride
26
May
2023

Key Findings From The Hacker-Powered Security Report: Bounty Payments Are Increasing (4 of 6)

As mentioned in our last post of this series, when hackers provide value, they appreciate thoughtful engagement with the organization…

HackerOne CEO joins Node.js Foundation Board
26
May
2023

5 Hacker-Powered Trends You Need to Know About

The Hacker-Powered Security Report examines the largest dataset of more than 800 hacker-powered security programs, compiles learnings from application security…

10 Ways to Hack Your “New Normal” Workweek
26
May
2023

Key Findings From The Hacker-Powered Security Report: Vulnerability Disclosure Policies (5 of 6)

When someone finds a potential issue with your website, hardware, or software, you want to be notified. Having a vulnerability…

Juneteenth: HackerOne’s Day for Action
25
May
2023

Aim High…Find, Fix, Win! | HackerOne

It took just under a minute for hackers to report the first security vulnerability to the U.S. Air Force. Twenty-five…

Security by the People: Announcing HackerOne’s FedRAMP Authorization
25
May
2023

Vulnerability Disclosure Policy Basics: 5 Critical Components

Vulnerability disclosure and hacker-powered security cannot be ignored. In July 2017, the Dept of Justice issued a framework for organizations…

How Federal Agencies Use Vulnerability Disclosure Policies to Level Up Security
25
May
2023

Capture the Flag (CTF) – Reversing the Password

Last week, I made a mini Capture The Flag (CTF) about a criminal who changed Barry’s password. The challenge was…

H1-415 Recap: Oath Pays Over $400,000 to Hackers in One Day
25
May
2023

Key Findings From The Hacker-Powered Security Report: Security Vulnerabilities Worry Companies the Most (6 of 6)

Everyone should be focused on the security of their data and systems, from the mom-and-pop store down the street to…

Find APIs Hiding in the Shadows
25
May
2023

Find APIs Hiding in the Shadows

What’s hiding in the shadows?  It’s a well understood reality that unmanaged IT assets tend to be unmonitored IT assets,…

Slack Increases Bounty Minimums For the Next 90 Days
25
May
2023

What Happens in Vegas…Stays on Hacktivity

Have you ever watched the Las Vegas sunrise after 12-hours of hacking through the night? The 50-hackers at H1-702 have….