Skip to main content

Application Security

Learn how to prevent vulnerabilities in your applications. We cover current practices in application security, cloud security, API testing, and more.

Customer Stories, Bounty, Application Security, Best Practices

Robinhood Goes Long on Bug Bounty: Q&A with Ian Carroll and @ashwarya

Seven years of bug bounty, 21-hour average time to bounty, 130 hackers thanked, and hackers on both sides of the program: Robinhood’s Ian Carroll...

Application Security

Is Virtual Reality Ripe for Cyber Attacks?

2017 may be the year Virtual Reality and Augmented reality truly go mainstream. But is it airtight from a...

Application Security, New Program Launch

Qualcomm Launches Bug Bounty Program

Qualcomm is the world leader in 3G and 4G technologies helping power your smartphones, among other things, and...

Application Security, From The CEO, News

Bug Bounty Programs Taking Off!

Bug bounty programs are revolutionizing the security industry and becoming an indispensable part of the modern...

Application Security, Hacker Resources, Best Practices

Bug Bounty Reports - How Do They Work?

Better bug reports = better relationships = better bounties! Whether you are new to bounty programs or a...

Application Security

Bug Bounty 5 Years In

Uber’s Collin Greene shares advice on on running a high quality bug bounty program from the mistakes made...

Application Security, Company Resources, Best Practices

How Bug Bounties Work: A Comic

Life is complicated, bug bounties should not be. Here’s a comic illustrating how bug bounty programs work by...

Application Security, Hacker Resources

6 Ways to Build Great Relationships with Security Teams

One of the most common questions we get from hackers is "How can I get along better with bounty admins or...

Application Security

Environment Is Everything, and Other Tips For Your Open Source Project

One of the most important things to be successful is creating a friendly and open environment, being...