WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Hackerone
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Infosecurity Magazine | September 22, 2015
There is much controversy around bug-hunting—as Oracle’s chief security officer recently demonstrated when she announced that she was writing cease-and-desist letters to third-party white-hats poking around in the software giant’s code. And she’s not alone: Historically, security researchers who found vulnerabilities either couldn’t find a way to report a security issue to a company, or if they did report issues, are often threatened with legal action....
Infosecurity Magazine | September 05, 2018
Celebrating the success of this year’s live hacking event, HackerOne (H1) recently announced that more than $500,000 was paid in bounties during the third annual h1-702 at DEF CON 26 in Las Vegas last month. More than 75 hackers from over 20 countries hacked five targets (including the United States Marine Corps) over the course of five days. Introduced back in August 2016 by a small group of HackerOne staff members hosting a contest over three days and nights, the live hacking event has b...
eweek | July 12, 2018
The 2018 Hacker-Powered Security report reveals that there has been an increasing volume of critical security vulnerabilities reported by researchers in the past year. HackerOne released its 2018 Hacker-Powered Security Report on July 11, providing insights into the current state of the bug bounty marketplace. The report is based on 78,275 security vulnerability reports that HackerOne received on its managed bug bounty platform, which handles programs for more than 1,000 organizations. The 46-pa...
abc6onyourside | January 15, 2020
A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...
Data Security
Whitepaper
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE