Source: www.hackerone.com – Author: johnk. After becoming the first hospitality brand to launch a public bug bounty program, Hyatt recently celebrated its first anniversary of the...
Day: February 8, 2025
Guess what’s coming!? #AndroidHackingMonth on @Hacker0x01 – Source:www.hackerone.com
Source: www.hackerone.com – Author: Ben Sadeghipour. Mobile hacking has become an essential part of the bug bounty hunter’s tool belt as more and more companies are...
h1-415 CTF Winners Announced! – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Hello hackers! Thanks to all of you who participated in our #h1415 CTF! We had a lot of fun building it,...
InnoGames Models Avatar After Top Ethical Hacker – Source:www.hackerone.com
Source: www.hackerone.com – Author: Lauren Koszarek. InnoGames is among gaming brands like Nintendo and Riot Games taking a proactive approach to protecting its assets, inviting trusted...
Why Every Federal Agency Needs a VDP – Source:www.hackerone.com
Source: www.hackerone.com – Author: Debbie Chang. “The decision to require that every agency have a vulnerability disclosure policy is a major step forward in both increasing...
GitLab Celebrates Awarding $1 Million in Bounties to Hackers on HackerOne – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Not every bug bounty program is built the same. Today, GitLab announced that they have surpassed the milestone of awarding out...
HackerOne Launches Bug Bounty Program for Kubernetes – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. The Kubernetes bug bounty program was announced today, after months of running in a ‘beta’ mode with invite-only researchers. The goal...
This Season, Give the Gift of Data-Driven Insight – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. It’s that time of the year again. Time to dig out your wrinkled “No, I can’t fix your computer” t-shirt from...
Using Bug Bounty Talent Pools to Attract and Maintain Top Talent – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. Security leaders today face a complex set of talent challenges—from training on the latest attack vectors, to finding talent with the...
Transparency Builds Trust – Source:www.hackerone.com
Source: www.hackerone.com – Author: Jobert Abma. Someone called it a “breach,” and the world took notice. Here is the story. There is no trust without transparency....
HackerOne is a 2019 Cyber Catalyst Designated Cybersecurity Solution – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. HackerOne has been chosen as a 2019 Cyber CatalystSM designated cybersecurity solution. HackerOne Bounty was selected by Cyber Catalyst insurers as...
8 High-impact Bugs and How HackerOne Customers Avoided a Breach: SQL Injection – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. This blog series counts down 8 high-impact vulnerability types, along with examples of how HackerOne helped avoid breaches associated with them....
How the Risk-Averse DoD Learned to Stop Worrying and Love the Hackers – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. There are few, if any, organizations more risk-averse than the U.S. Department of Defense. But even this staid agency has realized...
Slack Increases Bounty Minimums For the Next 90 Days – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. This blog post was contributed by Slack Staff Technical Program Manager Branden Jordan. Given the success of Slack’s previous promotion and...
Live Hacking Goes Virtual – Source:www.hackerone.com
Source: www.hackerone.com – Author: Jessica Sexton. At a time when security must be managed remotely, HackerOne and Verizon Media called on the naturally remote and global...
Hack for Good: Easily Donate Bounties to WHO’s COVID-19 Response Fund – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. The community has come together in some amazing ways to support COVID-19 relief efforts from Marc Rogers’ CTI League, the US...
Six years of the GitHub Security Bug Bounty program – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. This guest blog post was authored by Brian Anglin, Application Security Engineer at GitHub and originally published on the GitHub company...
Live hacking the U.S. Air Force, UK Ministry of Defence and Verizon Media in Los Angeles at h1-213 – Source:www.hackerone.com
Source: www.hackerone.com – Author: Jessica Sexton. On November 6th, over 60 hackers descended on the City of Angels for the final HackerOne flagship live hacking event...
My Career Just Got Hacked: Rana Robillard Joins HackerOne – Source:www.hackerone.com
Source: www.hackerone.com – Author: Anonymous. My career just got hacked.. and I couldn’t be more excited about it. Turns out, getting your career hacked* can be...
Live Hacking Events | 2019 Recap and the Road Ahead – Source:www.hackerone.com
Source: www.hackerone.com – Author: Jessica Sexton. Since our first event in Las Vegas in 2016, we have hosted 20 events in 12 different cities with 14 different customers....
Confessions of European CISOs – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Ever wondered what’s been keeping your CISO up at night? Well, wonder no more. We did some research to find out...
LINE Security Bug Bounty Program Report 2019 – Source:www.hackerone.com
Source: www.hackerone.com – Author: johnk. This guest blog post was authored by Robin Lunde from the LINE Security team and originally published on the LINE company...
Congratulations, Cosmin! The world’s seventh million-dollar bug bounty hacker – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. The entire HackerOne team is beyond excited that the ranks of seven-figure-earning hackers have risen to eight this month. Cosmin (@inhibitor181)...
Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have uncovered two malicious machine learning (ML) models on Hugging Face that leveraged an unusual technique of “broken” pickle...
UK is Ordering Apple to Break its Own Encryption – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier The Washington Post is reporting that the UK government has served Apple with a “technical capability notice” as defined by...
Friday Squid Blogging: The Colossal Squid – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Dancing on thin ice • February 8, 2025 2:30 AM Anything on the biggest security story going on...
Screenshot-Reading Malware – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Kaspersky is reporting on a new type of smartphone malware. The malware in question uses optical character recognition (OCR) to...
Teen Hacker “Natohub” Caught for NATO, UN, and US Army Breaches – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A joint operation between the National Police and the Civil Guard concluded in the arrest of a suspected cybercriminal in...
Juneteenth: HackerOne’s Day for Action – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Starting this Friday, June 19th will become HackerOne’s annual Day for Action. For Black Americans and communities of color around the...
Scaling & Prioritizing Product Security with Zendesk – Source:www.hackerone.com
Source: www.hackerone.com – Author: HackerOne. Zendesk, Inc. (NYSE: ZEN) is one of the fastest-growing customer support platforms in the world. With over 150,000 customer accounts representing...