Skip to main content

Ethical Hacker

Ethical hackers, pentesters, and security researchers. We explain everything you need to know about them and how they can help your organization.

Ethical Hacker

What Does Belgium’s New Legal Framework On Hacking Mean For Me?

The Belgian government has recently announced a new Belgian law that will allow ethical hackers to hack any Belgian company without any prior...

Company News, Ethical Hacker, Hacker Powered Security Report

Key Findings From The Hacker-Powered Security Report: Bounty Payments Are Increasing (4 of 6)

As you can imagine, money talks. Better hackers — those with more experience and in-demand skills — go where...

Ethical Hacker, Hacker Powered Security Report, Data and Analysis

Security Risk Assessment Report - Key Facts

Our Hacker-Powered Security Report is so chock-full of compelling insights, interesting tidbits, and...

Ethical Hacker, Hacker Resources

How to: Recon and Content Discovery

Recon plays a major role while hacking on a program. Recon doesn’t always mean to find subdomains belonging to...

Ethical Hacker, New Features

Faster and Better: New Bank Transfer Payment Feature for Hackers

We’re happy to announce that we’re adding Bank Transfers as a payout option to complement Paypal and Coinbase...

Ethical Hacker, Hacker Resources, News

Hey Hackers: We’ve got your free Burp Suite Professional license right here

Burp Suite is the premier offensive hacking solution, and now when new hackers reach at least a 500 reputation...

Ethical Hacker

Q&A With @MalwareTechBlog

When he’s not reverse engineering malware, Marcus Hutchins (aka @MalwareTechBlog) can be found surfing...

Ethical Hacker, Vulnerability Disclosure, Best Practices, Response

Webinar Recap: Attorneys Chime in on Hacker-Powered Security

To learn more about how legal teams and federal enforcers view hacker-powered security, we asked Megan Brown...

Ethical Hacker, Hacker Resources

How To: Command Injections

A command injection is a class of vulnerabilities where the attacker can control one or multiple commands that...