Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Hackerone
Hackerone
From Free Food to Free Flights: Kanishk’s Journey – Source:www.hackerone.com
Source: www.hackerone.com - Author: luke. According to The 2016 Bug Bounty Hacker Report, approximately 20% of...
Hackerone
Hacker Spotlight: Interview with insiderphd – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. When Katie Paxton-Fear, aka @InsiderPhD, was invited to be a mentee...
Hackerone
The $30,000 Gem: Part 1 – Source:www.hackerone.com
Source: www.hackerone.com - Author: siebejan. Opening your database to the world is a scary thought! But...
Hackerone
How To: Server-Side Request Forgery (SSRF) – Source:www.hackerone.com
Source: www.hackerone.com - Author: Jobert Abma. Server-Side Request Forgery, SSRF for short, is a vulnerability class...
Hackerone
Hacker Q&A with Alyssa: We are all still learning – Source:www.hackerone.com
Source: www.hackerone.com - Author: luke. At 16 Alyssa Herrera discovered BugBounties and HackerOne--she hasn't looked back...
Hackerone
Hacker Q&A with Rachel Tobac: Hacking Companies Through Their People – Source:www.hackerone.com
Source: www.hackerone.com - Author: Tiffany Long. CEO and Co-founder of SocialProof Security, Rachel Tobac hacks people....
Hackerone
Introducing My Programs – Source:www.hackerone.com
Source: www.hackerone.com - Author: Martijn Russchen. In December 2018 we released Hacker Dashboard, the central place...
Hackerone
@try_to_hack Makes History as First Bug Bounty Hacker to Earn over $1 Million – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. 19-year-old Argentinian @try_to_hack just made history as the first to earn...
Hackerone
Hackers have earned more than $50M in bug bounty cash on HackerOne: Time to celebrate! – Source:www.hackerone.com
Source: www.hackerone.com - Author: HackerOne. Hacking has a storied history. Hackers have always been curious people...
Hackerone
PayPal Thanks Hackers with $1 Million in 7 Months on HackerOne – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. This blog post was written and contributed by Ray Duran on...
Hackerone
Cloud Security Alliance Webinar Recap: Avoid the Breach with Shopify’s Andrew Dunbar – Source:www.hackerone.com
Source: www.hackerone.com - Author: HackerOne. In this Cloud Security Alliance (CSA) fireside chat, Shopify’s VP of...
Hackerone
HackerOne Praised By An Original Hacker – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. A hacker is “one who enjoys the intellectual challenge of creatively...
Hackerone
How the Risk-Averse DoD Learned to Stop Worrying and Love the Hackers – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. There are few, if any, organizations more risk-averse than the U.S....
Hackerone
Congratulations, Cosmin! The world’s seventh million-dollar bug bounty hacker – Source:www.hackerone.com
Source: www.hackerone.com - Author: HackerOne. The entire HackerOne team is beyond excited that the ranks of...
Hackerone
Hackweek: An insider’s look at HackerOne culture – Source:www.hackerone.com
Source: www.hackerone.com - Author: Rana Robillard. I’m now a month into my role as Chief People...
Hackerone
Announcing the PlayStation Bug Bounty Program – Source:www.hackerone.com
Source: www.hackerone.com - Author: HackerOne. This guest post is authored by Geoff Norton, Senior Director Software...
Hackerone
What to Look For in a Penetration Testing Company – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. What are Penetration Tests?Penetration testing is one of the most widely...
Hackerone
Hacker Spotlight: Interview with todayisnew – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. Eric Head, otherwise known as @todayisnew on HackerOne, considers himself an...
Hackerone
Reputation, Signal & Impact Calculation Enhancements – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. We’re pleased to announce some enhancements to how Reputation, Signal, and...
Hackerone
National University of Singapore Taps Students to Hack for Good – Source:www.hackerone.com
Source: www.hackerone.com - Author: HackerOne. With the growing shortage of cybersecurity professionals, universities are increasingly stepping...
Hackerone
Become a HackerOne Brand Ambassador – Source:www.hackerone.com
Source: www.hackerone.com - Author: Jenn Eugenio. HackerOne is excited to announce the launch of the Hacker...
Hackerone
HackerOne Expands Integrations Ecosystem to Connect and Defend Customers – Source:www.hackerone.com
Source: www.hackerone.com - Author: HackerOne. Revealed at Security@, HackerOne adds PagerDuty, ServiceNow, Splunk, SumoLogic to advance...
Hackerone
What is Vulnerability Scanning? [And How to Do It Right] – Source:www.hackerone.com
Source: www.hackerone.com - Author: HackerOne. Wondering what vulnerability scanning is? We will explain how it works,...
Hackerone
The Top 5 Cloud Security Risks: How Hacker-Powered Security Can Help – Source:www.hackerone.com
Source: www.hackerone.com - Author: jkanevsky@hackerone.com. Widespread digital transformation means increased cloud security risk. Learn how human...
Hackerone
General Motors Celebrates Long-Term Success With Hackers – Source:www.hackerone.com
Source: www.hackerone.com - Author: HackerOne. General Motors has been engaged with HackerOne for seven years. Here's...
Hackerone
GitHub Embraces Hacker-Powered Security To Protect 55 Million Projects – Source:www.hackerone.com
Source: www.hackerone.com - Author: luke. We recently published The GitHub Bug Bounty Story and couldn’t be...
Hackerone
451 Research Defines 7-Step Roadmap for Hacker-Powered Security Success – Source:www.hackerone.com
Source: www.hackerone.com - Author: luke. One of the top IT research and advisory companies, 451 Research,...
Hackerone
Key Findings From The Hacker-Powered Security Report: Security Responsiveness is Improving (2 of 6) – Source:www.hackerone.com
Source: www.hackerone.com - Author: luke. With hacker-powered security, it’s critical to open and maintain a line...
Hackerone
Q&A With @MalwareTechBlog – Source:www.hackerone.com
Source: www.hackerone.com - Author: luke. When he’s not reverse engineering malware, Marcus Hutchins (aka @MalwareTechBlog) can...
Hackerone
Security Risk Assessment Report – Key Facts – Source:www.hackerone.com
Source: www.hackerone.com - Author: luke. Our Hacker-Powered Security Report is so chock-full of compelling insights, interesting...
Posts navigation
1
2
…
4
Latest News
securelist.com
Phishing attacks leveraging HTML code inside SVG files – Source: securelist.com
21/04/2025
securityweek.com
Events Giant Legends International Hacked – Source: www.securityweek.com
20/04/2025
The Hacker News
APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures – Source:thehackernews.com
20/04/2025
The Register Security
Hacking US crosswalks to talk like Zuck is as easy as 1234 – Source: go.theregister.com
19/04/2025
The Hacker News
Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems – Source:thehackernews.com
19/04/2025
The Hacker News
ASUS Confirms Critical Flaw in AiCloud Routers; Users Urged to Update Firmware – Source:thehackernews.com
19/04/2025