Through a Hacker’s Eyes: Recapping h1-604
For the first time ever, a hacker writes a live hacking recap blog, highlighting what it is like to attend a live event. Katie (@InsiderPhD)…
For the first time ever, a hacker writes a live hacking recap blog, highlighting what it is like to attend a live event. Katie (@InsiderPhD)…
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on a regular basis. Here are…
HackerOne and the U.S. Department of Defense began working together in 2016 with the launch of Hack the Pentagon. Announced at the third annual Security@…
Detectify Crowdsource is a platform where hackers can submit vulnerabilities in web applications. Their findings are reviewed by our security team, and built into our…
Customers tell us that a big difference between hacker-powered security and traditional approaches is the impact. Since hackers make money for reporting vulnerabilities with a…
A technical write-up explaining AWS S3 misconfiguration is available on our Labs blog. AWS Simple Storage Service (often shortened to S3) is used by companies…
This blog post was contributed by Slack Staff Technical Program Manager Branden Jordan. Over the past five years, Slack and HackerOne have established a partnership…
To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on a regular basis. Here are…
Each blog in the series “Breaking Down the Benefits of Hacker-Powered Pentests” has focused on one of the key findings in Forrester Consulting’s report The…
Findings are a key component of our service, which is why we decided the finding details view deserved a facelift. The improved finding details view…
Hey there, I hope you’ve been doing well! Life Advice from VCs This week I found myself at a dinner with a few VCs, founders,…
Fueled by tremendous demand for hacker-powered security in the region, security veteran Attley Ng has joined HackerOne as Vice President of Asia Pacific, based in…