Category: Mix
Open source models are the backbone of the modern internet. Therefore, it’s our duty to defend them. That’s why HackerOne…
Traditional penetration testing is an important tool in your appsec strategy toolbox. Compliance requires it. Your CIO understands it. Your…
Great news for U.S. citizens! Over 3,000 valid security vulnerabilities have been resolved with the U.S. Department of Defense’s “Hack…
Want to win an all expenses paid trip to New York City to hack against HackerOne 1337 and a chance…
Hello hackers! Thanks to all of you who participated in our first ever h1-212 CTF! We had a lot of…
The attention being given to vulnerability disclosure policies (VDP) in the past year has increased dramatically. It might be the…
Data breaches in information security have become an inescapable reality. A common inquiry we receive here at HackerOne is for…
When the European General Data Protection Regulation (GDPR) takes effect on May 25, 2018, every organization that collects information on…
Before you propose a bug bounty program to your organization, you need a comprehensive plan. That’s just one of the…
In the League of Legends world, your nexus is protected from outside threats by a strong team of diverse champions….
A lot could go wrong on the internet! A clever attacker can with ease gather all the intelligence he/she needs…
Like many organizations, AlienVault had set up a vulnerability disclosure policy for any bugs found on their website. If someone…