HackerOne is a 2019 Cyber Catalyst Designated Cybersecurity Solution
johnk 2019-11-21 19:00:00 www.hackerone.com HackerOne has been chosen as a 2019 Cyber CatalystSM designated cybersecurity solution. HackerOne Bounty was selected ...
johnk 2019-11-21 19:00:00 www.hackerone.com HackerOne has been chosen as a 2019 Cyber CatalystSM designated cybersecurity solution. HackerOne Bounty was selected ...
johnk 2019-12-13 18:30:00 www.hackerone.com It’s that time of the year again. Time to dig out your wrinkled “No, I can’t ...
johnk 2020-01-27 13:00:00 www.hackerone.com Egyptian bug bounty hunter, Ahmed Sherif a.k.a @Batee5a, is the first hacker to be named InnoGames’ Most ...
HackerOne 2020-02-03 18:00:00 www.hackerone.com Hello hackers! Thanks to all of you who participated in our #h1415 CTF! We had a lot ...
2025-02-06 13:40:00 github.com A small GUI application built in redbean that lets you explore your SQLite databases "page by page" ...
Jessica Sexton 2020-05-11 19:00:00 www.hackerone.com On February 21st, almost 70 hackers participated in HackerOne’s first Flagship Live Hacking Event of ...
Aman Mishra 2025-02-06 04:02:00 gbhackers.com A sophisticated malware campaign, dubbed “FatBoyPanel,” has been uncovered by cybersecurity researchers, targeting users of ...
johnk 2020-06-05 12:00:00 www.hackerone.com Hackers represent a global force for good, coming together to help address the growing security needs ...
johnk 2020-06-12 10:00:00 www.hackerone.com Hello hackers! Thanks to all of you who participated in our #h1-2006 CTF! We had a lot of ...
Aman Mishra 2025-02-06 04:04:00 gbhackers.com In a concerning development, the North Korean-backed hacking group Kimsuky has intensified its use of ...
johnk 2020-06-12 12:00:00 www.hackerone.com @cache-money comes from a software engineering background and later switched to security engineering. After a year ...
HackerOne 2020-06-15 15:00:00 www.hackerone.com Hackers represent a global force for good, coming together to help address the growing security needs ...
johnk 2020-06-19 12:00:00 www.hackerone.com Corb3nik is a bug bounty hunter with a several years of experience in the pentest and ...
Michiel Prins 2025-02-03 13:27:00 www.hackerone.com In 2024, we saw the adoption of AI in hacking workflows take off. In a survey ...
HackerOne 2020-06-25 13:10:00 www.hackerone.com June is widely recognized as Pride month --an important moment to pause, celebrate, and support our ...
johnk 2020-07-01 12:00:00 www.hackerone.com We’re pleased to announce some enhancements to how Reputation, Signal, and Impact are calculated. These changes ...
2025-02-05 13:40:00 github.com Some extra Collection classes targetting Java 8. The main thing here at the moment is a RingBuffer ...
2025-02-05 07:09:00 www.fiwix.org Fiwix is an operating system kernel written from scratch, based on the UNIX architecture and fully focused ...
2025-02-05 10:03:00 servo.org Two years after the renewed activity on the project we can confirm that Servo is fully back. ...
johnk 2020-07-17 12:15:00 www.hackerone.com Hailing from Fargo, North Dakota, hogarth45 — known offline as Jesse Clark — joined HackerOne in ...
HackerOne 2020-09-16 12:45:00 www.hackerone.com Traditional pentesting suffers from a persistent issue: a lack of transparency into the pentest process itself ...
Aman Mishra 2025-02-05 03:13:00 gbhackers.com A sophisticated cyber espionage campaign attributed to the Chinese hacking group DaggerFly has been identified, ...
Aman Mishra 2025-02-05 01:29:00 gbhackers.com In a concerning revelation, cybersecurity firm eSentire’s Threat Response Unit (TRU) has detected active exploitation ...
HackerOne 2020-10-05 11:30:00 www.hackerone.com We’re excited to announce our integration with ServiceNow Incident Management. This integration allows customers to escalate ...
2025-02-04 18:11:00 linusakesson.net Nine is a small, seemingly impossible C64 demo that I released at Fjälldata 2025. https://www.youtube.com/watch?v=Ws4twUyt-MY I'm working on ...
HackerOne 2020-11-05 12:00:00 www.hackerone.com For customers and hackers, the triage experience is central to hacker-powered security. Our triagers consist of ...