SlideShare a Scribd company logo
1 of 14
Download to read offline
THE 2018 HACKER REPORTInsights on the hacker mindset, who they are, and the types
of vulnerabilities they find.
166,000+
Hackers
72,000+
Valid Vulnerabilities
Submitted
$23,500,000+
Bounties Paid
THE HACKERONE PLATFORM
* as of December2017
HackersAreHeroesโ€ฆ
and1,698ofthemresponded
toquestionsforthisreport.
THE HACKERSโ€™ RESULTS
Money ranks fourth for why bug bounty
hackers hack.
Top hackers earn 2.7x the median salary of
a software engineer in their home country.
12% of hackers make $20,000 or more
annually from bug bounties.
25% of hackers rely on bounties for at least 50%
of their annual income.
India and the United States are the top two
countries represented.
53% of hackers are self-taught.
GEOGRAPHY
WHERE HACKERS RESIDE
India, the United States, Russia, Pakistan and the United
Kingdom round out the top five countries represented,
with 43% based in India and the United States combined.
FIGURE 1: GEOGRAPHIC REPRESENTATION OF WHERE HACKERS ARE LOCATED IN THE WORLD
โ‰ฅ 2 0 %โ‰ค5%
6.3%
19.9%
23.3%
Geographic Representation of Where Hackers are Located in the World
Visualization of the Bounties by
Geography showing on the left
where the companies paying
bounties are located and on the
right where hackers receiving
bounties are located.
CASH
HOW BOUNTY
MONEY FLOWS
FROM ORGANIZATIONS
TO HACKERS USA: $15,970,630
CANADA: $1,201,485
GERMANY: $458,882
RUSSIA: $308,346
SINGAPORE: $256,280
UK: $252,960
UAE: $143,375
FINLAND: $142,149
MALAYSIA: $138,215
SWITZERLAND: $118,393
$4,641,693
ALL OTHER
USA: $4,150,672
ARGENTINA: $673,403
RUSSIA: $1,296,018
PAKISTAN: $647,339
INDIA: $3,098,250
AUSTRALIA: $1,296,411
UK: $916,035
HONG KONG: $749,770
SWEDEN: $746,326
BOUNTIES PAID BY COMPANIES VS. BOUNTIES PAID TO HACKERS
$9,375,656
GERMANY: $682,528
ALL OTHER
Geographic Money Flow
ECONOMICS
BOUNTIES AS AN INCOME SOURCE
Median annual wage of a โ€œsoftware engineerโ€ was derived
from PayScale for each region. The multiplier was found by
dividing the upper range of bounty earners on HackerOne
for the region by the median annual wage of a software
engineer for the related region.
India
Argentina
Egypt
Hong Kong
Philippines
Latvia
Pakistan
Morocco
China
Belgium
Australia
Poland
Canada
USA
MULTIPLIER
Bug Bounties vs. Salary
$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$
$$$$$$$$
$$$$$$$
$$$$$
$$$$$
$$$$
$$$
$$$
$$
$$
$$
$$
$$
SANDEEP
Advice to beginners...
Since bug bounty is booming nowadays, competition between
hackers is increasing. So, have some patience when you are first
starting, and keep improving your recon skills. You have Internet,
you have all the resourcesโ€”keep reading from others' blogs and
disclosed practical reports on HackerOne. Patience and better
reporting is the KEY.
Over 66% of hackers spend 20 hours or less per week hacking.
AGE, APPROXIMATELY HOW MANY HOURS PER WEEK
PEND HACKING? HACKERONE HOURS NOT INCLUDED
1-10 HOURS: 44.2%
10-20 HOURS: 22.4%
20-30 HOURS: 13%
30-40 HOURS: 13%
40+ HOURS: 13.1%
On Average, Approximagely How Many Hours Per
Week Do You Spend Hacking?
IT/SOFTWARE/HARDWARE: 46.7%
STUDENT : 25.2%
CONSULTING : 12.3%
EDUCATION : 7.2%
UNEMPLOYED : 1.9%
FINANCE : 1.5%
GOVERNMENT : 1.1%
TELECOMMUNICATIONS : 0.3%
CONSTRUCTION : 0.7%
STAY AT HOME PARENT : 0.7%
HEALTHCARE : 0.5%
LEGAL : 0.4%
MANUFACTURING : 0.4%
INSURANCE : 0.3%
WHAT BEST DESCRIBES YOUR DAY-TO-DAY OCCUPATION?
What Best Describes Your
Professional Title?
DEMOGRAPHICS
HACKERS BY NIGHT, STUDENTS AND TECH EMPLOYEES BY DAY
AGE, APPROXIMATELY HOW MANY HOURS PER WEEK
END HACKING? HACKERONE HOURS NOT INCLUDED
1-10 HOURS: 44.2%
10-20 HOURS: 22.4%
20-30 HOURS: 13%
30-40 HOURS: 13%
40+ HOURS: 13.1%
IT/SOFTWARE/HARDWARE: 46.7%
STUDENT : 25.2%
CONSULTING : 12.3%
EDUCATION : 7.2%
UNEMPLOYED : 1.9%
FINANCE : 1.5%
GOVERNMENT : 1.1%
TELECOMMUNICATIONS : 0.3%
CONSTRUCTION : 0.7%
STAY AT HOME PARENT : 0.7%
HEALTHCARE : 0.5%
LEGAL : 0.4%
MANUFACTURING : 0.4%
INSURANCE : 0.3%
WHAT BEST DESCRIBES YOUR DAY-TO-DAY OCCUPATION?
While many hackers are young, nearly 29% have been hacking for 6 years or more.
What's Your Age?
AGE
YOUTHFUL, CURIOUS, GIFTED PROFESSIONALS
WHAT'S YOUR AGE?
18-24 YEARS: 45.3%
25-34 YEARS: 37.3%
35-49 YEARS: 9.2%
13-17 YEARS: 1%
50-64 YEARS: 0.5%
UNDER 13 YEARS: 0.4%
Approximately How Many Years Have You Been Hacking?
APPROXIMATELY HOW MANY YEARS HAVE YOU BEEN HACKING?
1-5 YEARS: 71.2%
6-10 YEARS: 18.1%
11-15 YEARS: 6.4%
16-20 YEARS: 2.2%
20+ YEARS: 2.1%
APPROXIMATELY HOW MANY YEARS HAVE YOU BEEN HACKING?
1-5 YEARS: 71.2%
6-10 YEARS: 18.1%
11-15 YEARS: 6.4%
16-20 YEARS: 2.2%
20+ YEARS: 2.1%
WHAT'S YOUR AGE?
18-24 YEARS: 45.3%
25-34 YEARS: 37.3%
35-49 YEARS: 9.2%
13-17 YEARS: 1%
50-64 YEARS: 0.5%
UNDER 13 YEARS: 0.4%
NICOLE
Iโ€™ve always had somewhat of a mindset for security, even
before I knew anything about computer science. Growing up,
my brain was constantly racing to figure out systems in order
to find loopholes and workarounds that I could slip through.
WHAT IS YOUR FAVORITE KIND OF PLATFORM OR PRODUCT TO HACK?
WEBSITES: 70.8%
IOS MOBILE APPS: 1.4%
ANDROID MOBILE APPS: 4.2%
DOWNLOADABLE SOFTWARE: 2.5%
WINDOWS MOBILE APPS: 0.1%
COMPUTER HARDWARE: 0.5%
FIRMWARE: 1.3%
OPERATING SYSTEMS: 3.1%
INTERNET OF THINGS: 2.6%
APIs : 7.5%
WHAT IS YOUR FAVORITE KIND OF PLATFORM OR PROD
WEBSITES: 70.8%
IOS MOBILE APPS: 1.4%
ANDROID MOBILE APPS:
DOWNLOADABLE SOFTW
WINDOWS MOBILE APPS
COMPUTER HARDWARE:
FIRMWARE: 1.3%
OPERATING SYSTEMS: 3
INTERNET OF THINGS: 2
APIs : 7.5%
SUPPLY CHAIN PARTNER
EVALUATING TECHNOLO
TECHNOLOGY THAT I U
What is Your Favorite Kind of Platform or Product to Hack?
ATTACK SURFFACE
HACKERS LOVE WEBAPPS
WHAT IS YOUR FAVORITE KIND OF PLATFORM OR PRODUCT TO HACK?
WEBSITES: 70.8%
IOS MOBILE APPS: 1.4%
ANDROID MOBILE APPS: 4.2%
DOWNLOADABLE SOFTWARE: 2.5%
WINDOWS MOBILE APPS: 0.1%
COMPUTER HARDWARE: 0.5%
FIRMWARE: 1.3%
OPERATING SYSTEMS: 3.1%
INTERNET OF THINGS: 2.6%
APIs : 7.5%
SUPPLY CHAIN PARTNER: 0.3%
EVALUATING TECHNOLOGY: 0.7%
TECHNOLOGY THAT I USE: 5.0%
WHY DO YOU HACK?
TO MAKE MONEY13.1%
TO BE CHALLENGED14.0%
TO LEARN TIPS AND TECHNIQUES14.7%
TO HAVE FUN14.0%
TO SHOW OFF3.0%
TO ADVANCE MY CAREER12.2%
TO HELP OTHERS8.5%
TO DO GOOD IN THE WORLD10.0%
TO PROTECT AND DEFEND10.4%
Why Do You Hack?
MOTIVATION
IT AINโ€™T ALL ABOUT THE MONEY
FRANS
Personally I hack because I really love to
build stuff and I also love to break stuff...
the best way to know how to build stuff
is to know how you can break it.
IBRAHM
How are hackers spending their bounties?
REWARDS
A HOUSE FOR MOM AND A DONATION FOR GOOD
DAVID FRANS
Helping my parents buy a house when
I first came to the U.S.
Donated the bountyโ€ฆto the EFF. A lot of my money actually goes into
hiring people.
ofhackershavedonatedbounty
moneytocharityorganizations,and
companieslikeQualcomm,Google,
andFacebookmatchbountiesthat
hackersdonate.
OVER24%
REWARDS
A HOUSE FOR MOM AND A DONATION FOR GOOD
SAM
The most meaningful purchase I made with bounty money
is actually a car. For a really long time it was just one car in
our house of three, and I really donโ€™t come from a wealthy
background. It was really an issue trying to find a way to get
around for everyoneโ€™s jobs, so when I got into bug bounty
I said, Iโ€™m going to get a car that everyone can use and I
think it really helped.
NION, OVER THE LAST YEAR, WHAT BEST DESCRIBES COMPANIESโ€™
ECEIVING VULNERABILITY REPORTS FROM SECURITY RESEARCHERS?
THEY ARE FAR MORE OPEN: 33.8%
THEY ARE SOMEWHAT MORE OPEN: 38.4%
THEY ARE NEITHER MORE NOR LESS OPEN: 16.5%
THEY ARE SOMEWHAT LESS OPEN: 4.7%
THEY ARE FAR LESS OPEN: 4.7%
HackerOne has paid out over $23 million in bounties in five years with
a goal of $100 million by the end of 2020.
In Your Opinion, Over the Last Year, What Best Describes Companies'
Reactions to Receiving Vulnerability Reports From Security Researchers?
THE FUTURE
MORE COMPANIES PAYING MORE BOUNTIES
NION, OVER THE LAST YEAR, WHAT BEST DESCRIBES COMPANIESโ€™
ECEIVING VULNERABILITY REPORTS FROM SECURITY RESEARCHERS?
THEY ARE FAR MORE OPEN: 33.8%
THEY ARE SOMEWHAT MORE OPEN: 38.4%
THEY ARE NEITHER MORE NOR LESS OPEN: 16.5%
THEY ARE SOMEWHAT LESS OPEN: 4.7%
THEY ARE FAR LESS OPEN: 4.7%
BRETT
At the end of the day, weโ€™re all in this together. Weโ€™re
trying to find stuff and fix issues. Weโ€™re trying to help
protect the world. Thatโ€™s what it comes down to.
And I like to be a part of that.
THE HACKERS
#TOGETHERWEHITHARDER

More Related Content

What's hot

You Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionCrowdStrike
ย 
CrowdCast Monthly: Operationalizing Intelligence
CrowdCast Monthly: Operationalizing IntelligenceCrowdCast Monthly: Operationalizing Intelligence
CrowdCast Monthly: Operationalizing IntelligenceCrowdStrike
ย 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportCyren, Inc
ย 
2016 Cyber Threats
2016 Cyber Threats2016 Cyber Threats
2016 Cyber ThreatsWendy Cheshire
ย 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingCyren, Inc
ย 
The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar Kaspersky
ย 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksCyren, Inc
ย 
Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowCyren, Inc
ย 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyCyren, Inc
ย 
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Rahul Neel Mani
ย 
Cybercrime and Corporate Reputation
Cybercrime and Corporate ReputationCybercrime and Corporate Reputation
Cybercrime and Corporate ReputationIpsos UK
ย 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTIONSylvain Martinez
ย 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns CrowdStrike
ย 
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...ThreatConnect
ย 
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdStrike
ย 
Crypto trap for social media 9.4.2016
Crypto trap for social media 9.4.2016Crypto trap for social media 9.4.2016
Crypto trap for social media 9.4.2016Michael Zuckerman
ย 
Episode IV: A New Scope
Episode IV: A New ScopeEpisode IV: A New Scope
Episode IV: A New ScopeThreatConnect
ย 
How to Monetize IP Reputation
How to Monetize IP ReputationHow to Monetize IP Reputation
How to Monetize IP ReputationAPNIC
ย 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
ย 

What's hot (20)

You Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And Detection
ย 
CrowdCast Monthly: Operationalizing Intelligence
CrowdCast Monthly: Operationalizing IntelligenceCrowdCast Monthly: Operationalizing Intelligence
CrowdCast Monthly: Operationalizing Intelligence
ย 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
ย 
2016 Cyber Threats
2016 Cyber Threats2016 Cyber Threats
2016 Cyber Threats
ย 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
ย 
The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar
ย 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array works
ย 
Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to know
ย 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking survey
ย 
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017
ย 
Cybercrime and Corporate Reputation
Cybercrime and Corporate ReputationCybercrime and Corporate Reputation
Cybercrime and Corporate Reputation
ย 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
ย 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
ย 
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
ย 
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas Attack
ย 
Crypto trap for social media 9.4.2016
Crypto trap for social media 9.4.2016Crypto trap for social media 9.4.2016
Crypto trap for social media 9.4.2016
ย 
Episode IV: A New Scope
Episode IV: A New ScopeEpisode IV: A New Scope
Episode IV: A New Scope
ย 
How to Monetize IP Reputation
How to Monetize IP ReputationHow to Monetize IP Reputation
How to Monetize IP Reputation
ย 
1530 track1 ulinski
1530 track1 ulinski1530 track1 ulinski
1530 track1 ulinski
ย 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
ย 

Similar to The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the vulnerabilities they find

Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youthnirmal00776
ย 
Cyber crime
Cyber crimeCyber crime
Cyber crimeDebayon Saha
ย 
Bug Bounty Basics
Bug Bounty BasicsBug Bounty Basics
Bug Bounty BasicsHackerOne
ย 
The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020Netpluz Asia Pte Ltd
ย 
Hacking And Virus.pptx
Hacking And Virus.pptxHacking And Virus.pptx
Hacking And Virus.pptxsahilshah476001
ย 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyMarian Merritt
ย 
CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziNCCOMMS
ย 
The Dangers of Lapto
The Dangers of LaptoThe Dangers of Lapto
The Dangers of LaptoInfosec Europe
ย 
Socialpreso craighannabus
Socialpreso craighannabusSocialpreso craighannabus
Socialpreso craighannabusDonaldphejane
ย 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearIronCore Labs
ย 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
ย 
How Consumers Engage with Mobile Apps
How Consumers Engage with Mobile AppsHow Consumers Engage with Mobile Apps
How Consumers Engage with Mobile AppsSIXTY
ย 
Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you thinkNathan Winters
ย 
HighBlood deck
HighBlood deckHighBlood deck
HighBlood deckHerbert Eng
ย 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
ย 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
ย 
Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?Blue Coat
ย 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
ย 

Similar to The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the vulnerabilities they find (20)

Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
ย 
Cyber crime
Cyber crimeCyber crime
Cyber crime
ย 
Bug Bounty Basics
Bug Bounty BasicsBug Bounty Basics
Bug Bounty Basics
ย 
The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
ย 
Hacking And Virus.pptx
Hacking And Virus.pptxHacking And Virus.pptx
Hacking And Virus.pptx
ย 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, Messy
ย 
CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael Narezzi
ย 
The Dangers of Lapto
The Dangers of LaptoThe Dangers of Lapto
The Dangers of Lapto
ย 
Socialpreso craighannabus
Socialpreso craighannabusSocialpreso craighannabus
Socialpreso craighannabus
ย 
Estado del ransomware en 2020
Estado del ransomware en 2020Estado del ransomware en 2020
Estado del ransomware en 2020
ย 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
ย 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
ย 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
ย 
How Consumers Engage with Mobile Apps
How Consumers Engage with Mobile AppsHow Consumers Engage with Mobile Apps
How Consumers Engage with Mobile Apps
ย 
Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you think
ย 
HighBlood deck
HighBlood deckHighBlood deck
HighBlood deck
ย 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
ย 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
ย 
Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?
ย 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
ย 

More from HackerOne

Federal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security GuideFederal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security GuideHackerOne
ย 
Understanding Information Security Assessment Types
Understanding Information Security Assessment TypesUnderstanding Information Security Assessment Types
Understanding Information Security Assessment TypesHackerOne
ย 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role HackerOne
ย 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017HackerOne
ย 
9 Top Bug Bounty Programs
9 Top Bug Bounty Programs9 Top Bug Bounty Programs
9 Top Bug Bounty ProgramsHackerOne
ย 
Voices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure PolicyVoices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure PolicyHackerOne
ย 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowHackerOne
ย 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityHackerOne
ย 
Bug Bounties and The Path to Secure Software by 451 Research
Bug Bounties and The Path to Secure Software by 451 ResearchBug Bounties and The Path to Secure Software by 451 Research
Bug Bounties and The Path to Secure Software by 451 ResearchHackerOne
ย 
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...HackerOne
ย 
How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...HackerOne
ย 
HackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning WangHackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning WangHackerOne
ย 
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered SecurityTapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered SecurityHackerOne
ย 
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...HackerOne
ย 
Meet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programsMeet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programsHackerOne
ย 

More from HackerOne (15)

Federal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security GuideFederal Trade Commission's Start With Security Guide
Federal Trade Commission's Start With Security Guide
ย 
Understanding Information Security Assessment Types
Understanding Information Security Assessment TypesUnderstanding Information Security Assessment Types
Understanding Information Security Assessment Types
ย 
Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role Everything you Need to Know about The Data Protection Officer Role
Everything you Need to Know about The Data Protection Officer Role
ย 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
ย 
9 Top Bug Bounty Programs
9 Top Bug Bounty Programs9 Top Bug Bounty Programs
9 Top Bug Bounty Programs
ย 
Voices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure PolicyVoices of Vulnerability Disclosure Policy
Voices of Vulnerability Disclosure Policy
ย 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
ย 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
ย 
Bug Bounties and The Path to Secure Software by 451 Research
Bug Bounties and The Path to Secure Software by 451 ResearchBug Bounties and The Path to Secure Software by 451 Research
Bug Bounties and The Path to Secure Software by 451 Research
ย 
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
ย 
How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...
ย 
HackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning WangHackerOne Presents in China - COO Ning Wang
HackerOne Presents in China - COO Ning Wang
ย 
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered SecurityTapping Hackers for Continuous Security: That's Hacker-Powered Security
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
ย 
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...Bounty Craft: Bug bounty reports  how do they work, @sushihack presents at Nu...
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
ย 
Meet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programsMeet the hackers powering the world's best bug bounty programs
Meet the hackers powering the world's best bug bounty programs
ย 

Recently uploaded

( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
ย 
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...nilamkumrai
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
ย 
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Delhi Call girls
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
ย 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
ย 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
ย 
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹nirzagarg
ย 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
ย 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLimonikaupta
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
ย 

Recently uploaded (20)

( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
ย 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
ย 
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
ย 
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
ย 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
ย 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
ย 
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
ย 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
ย 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
ย 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
ย 

The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the vulnerabilities they find

  • 1. THE 2018 HACKER REPORTInsights on the hacker mindset, who they are, and the types of vulnerabilities they find.
  • 2. 166,000+ Hackers 72,000+ Valid Vulnerabilities Submitted $23,500,000+ Bounties Paid THE HACKERONE PLATFORM * as of December2017 HackersAreHeroesโ€ฆ and1,698ofthemresponded toquestionsforthisreport.
  • 3. THE HACKERSโ€™ RESULTS Money ranks fourth for why bug bounty hackers hack. Top hackers earn 2.7x the median salary of a software engineer in their home country. 12% of hackers make $20,000 or more annually from bug bounties. 25% of hackers rely on bounties for at least 50% of their annual income. India and the United States are the top two countries represented. 53% of hackers are self-taught.
  • 4. GEOGRAPHY WHERE HACKERS RESIDE India, the United States, Russia, Pakistan and the United Kingdom round out the top five countries represented, with 43% based in India and the United States combined. FIGURE 1: GEOGRAPHIC REPRESENTATION OF WHERE HACKERS ARE LOCATED IN THE WORLD โ‰ฅ 2 0 %โ‰ค5% 6.3% 19.9% 23.3% Geographic Representation of Where Hackers are Located in the World
  • 5. Visualization of the Bounties by Geography showing on the left where the companies paying bounties are located and on the right where hackers receiving bounties are located. CASH HOW BOUNTY MONEY FLOWS FROM ORGANIZATIONS TO HACKERS USA: $15,970,630 CANADA: $1,201,485 GERMANY: $458,882 RUSSIA: $308,346 SINGAPORE: $256,280 UK: $252,960 UAE: $143,375 FINLAND: $142,149 MALAYSIA: $138,215 SWITZERLAND: $118,393 $4,641,693 ALL OTHER USA: $4,150,672 ARGENTINA: $673,403 RUSSIA: $1,296,018 PAKISTAN: $647,339 INDIA: $3,098,250 AUSTRALIA: $1,296,411 UK: $916,035 HONG KONG: $749,770 SWEDEN: $746,326 BOUNTIES PAID BY COMPANIES VS. BOUNTIES PAID TO HACKERS $9,375,656 GERMANY: $682,528 ALL OTHER Geographic Money Flow
  • 6. ECONOMICS BOUNTIES AS AN INCOME SOURCE Median annual wage of a โ€œsoftware engineerโ€ was derived from PayScale for each region. The multiplier was found by dividing the upper range of bounty earners on HackerOne for the region by the median annual wage of a software engineer for the related region. India Argentina Egypt Hong Kong Philippines Latvia Pakistan Morocco China Belgium Australia Poland Canada USA MULTIPLIER Bug Bounties vs. Salary $$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$ $$$$$$$$ $$$$$$$ $$$$$ $$$$$ $$$$ $$$ $$$ $$ $$ $$ $$ $$ SANDEEP Advice to beginners... Since bug bounty is booming nowadays, competition between hackers is increasing. So, have some patience when you are first starting, and keep improving your recon skills. You have Internet, you have all the resourcesโ€”keep reading from others' blogs and disclosed practical reports on HackerOne. Patience and better reporting is the KEY.
  • 7. Over 66% of hackers spend 20 hours or less per week hacking. AGE, APPROXIMATELY HOW MANY HOURS PER WEEK PEND HACKING? HACKERONE HOURS NOT INCLUDED 1-10 HOURS: 44.2% 10-20 HOURS: 22.4% 20-30 HOURS: 13% 30-40 HOURS: 13% 40+ HOURS: 13.1% On Average, Approximagely How Many Hours Per Week Do You Spend Hacking? IT/SOFTWARE/HARDWARE: 46.7% STUDENT : 25.2% CONSULTING : 12.3% EDUCATION : 7.2% UNEMPLOYED : 1.9% FINANCE : 1.5% GOVERNMENT : 1.1% TELECOMMUNICATIONS : 0.3% CONSTRUCTION : 0.7% STAY AT HOME PARENT : 0.7% HEALTHCARE : 0.5% LEGAL : 0.4% MANUFACTURING : 0.4% INSURANCE : 0.3% WHAT BEST DESCRIBES YOUR DAY-TO-DAY OCCUPATION? What Best Describes Your Professional Title? DEMOGRAPHICS HACKERS BY NIGHT, STUDENTS AND TECH EMPLOYEES BY DAY AGE, APPROXIMATELY HOW MANY HOURS PER WEEK END HACKING? HACKERONE HOURS NOT INCLUDED 1-10 HOURS: 44.2% 10-20 HOURS: 22.4% 20-30 HOURS: 13% 30-40 HOURS: 13% 40+ HOURS: 13.1% IT/SOFTWARE/HARDWARE: 46.7% STUDENT : 25.2% CONSULTING : 12.3% EDUCATION : 7.2% UNEMPLOYED : 1.9% FINANCE : 1.5% GOVERNMENT : 1.1% TELECOMMUNICATIONS : 0.3% CONSTRUCTION : 0.7% STAY AT HOME PARENT : 0.7% HEALTHCARE : 0.5% LEGAL : 0.4% MANUFACTURING : 0.4% INSURANCE : 0.3% WHAT BEST DESCRIBES YOUR DAY-TO-DAY OCCUPATION?
  • 8. While many hackers are young, nearly 29% have been hacking for 6 years or more. What's Your Age? AGE YOUTHFUL, CURIOUS, GIFTED PROFESSIONALS WHAT'S YOUR AGE? 18-24 YEARS: 45.3% 25-34 YEARS: 37.3% 35-49 YEARS: 9.2% 13-17 YEARS: 1% 50-64 YEARS: 0.5% UNDER 13 YEARS: 0.4% Approximately How Many Years Have You Been Hacking? APPROXIMATELY HOW MANY YEARS HAVE YOU BEEN HACKING? 1-5 YEARS: 71.2% 6-10 YEARS: 18.1% 11-15 YEARS: 6.4% 16-20 YEARS: 2.2% 20+ YEARS: 2.1% APPROXIMATELY HOW MANY YEARS HAVE YOU BEEN HACKING? 1-5 YEARS: 71.2% 6-10 YEARS: 18.1% 11-15 YEARS: 6.4% 16-20 YEARS: 2.2% 20+ YEARS: 2.1% WHAT'S YOUR AGE? 18-24 YEARS: 45.3% 25-34 YEARS: 37.3% 35-49 YEARS: 9.2% 13-17 YEARS: 1% 50-64 YEARS: 0.5% UNDER 13 YEARS: 0.4%
  • 9. NICOLE Iโ€™ve always had somewhat of a mindset for security, even before I knew anything about computer science. Growing up, my brain was constantly racing to figure out systems in order to find loopholes and workarounds that I could slip through. WHAT IS YOUR FAVORITE KIND OF PLATFORM OR PRODUCT TO HACK? WEBSITES: 70.8% IOS MOBILE APPS: 1.4% ANDROID MOBILE APPS: 4.2% DOWNLOADABLE SOFTWARE: 2.5% WINDOWS MOBILE APPS: 0.1% COMPUTER HARDWARE: 0.5% FIRMWARE: 1.3% OPERATING SYSTEMS: 3.1% INTERNET OF THINGS: 2.6% APIs : 7.5% WHAT IS YOUR FAVORITE KIND OF PLATFORM OR PROD WEBSITES: 70.8% IOS MOBILE APPS: 1.4% ANDROID MOBILE APPS: DOWNLOADABLE SOFTW WINDOWS MOBILE APPS COMPUTER HARDWARE: FIRMWARE: 1.3% OPERATING SYSTEMS: 3 INTERNET OF THINGS: 2 APIs : 7.5% SUPPLY CHAIN PARTNER EVALUATING TECHNOLO TECHNOLOGY THAT I U What is Your Favorite Kind of Platform or Product to Hack? ATTACK SURFFACE HACKERS LOVE WEBAPPS WHAT IS YOUR FAVORITE KIND OF PLATFORM OR PRODUCT TO HACK? WEBSITES: 70.8% IOS MOBILE APPS: 1.4% ANDROID MOBILE APPS: 4.2% DOWNLOADABLE SOFTWARE: 2.5% WINDOWS MOBILE APPS: 0.1% COMPUTER HARDWARE: 0.5% FIRMWARE: 1.3% OPERATING SYSTEMS: 3.1% INTERNET OF THINGS: 2.6% APIs : 7.5% SUPPLY CHAIN PARTNER: 0.3% EVALUATING TECHNOLOGY: 0.7% TECHNOLOGY THAT I USE: 5.0%
  • 10. WHY DO YOU HACK? TO MAKE MONEY13.1% TO BE CHALLENGED14.0% TO LEARN TIPS AND TECHNIQUES14.7% TO HAVE FUN14.0% TO SHOW OFF3.0% TO ADVANCE MY CAREER12.2% TO HELP OTHERS8.5% TO DO GOOD IN THE WORLD10.0% TO PROTECT AND DEFEND10.4% Why Do You Hack? MOTIVATION IT AINโ€™T ALL ABOUT THE MONEY FRANS Personally I hack because I really love to build stuff and I also love to break stuff... the best way to know how to build stuff is to know how you can break it.
  • 11. IBRAHM How are hackers spending their bounties? REWARDS A HOUSE FOR MOM AND A DONATION FOR GOOD DAVID FRANS Helping my parents buy a house when I first came to the U.S. Donated the bountyโ€ฆto the EFF. A lot of my money actually goes into hiring people.
  • 12. ofhackershavedonatedbounty moneytocharityorganizations,and companieslikeQualcomm,Google, andFacebookmatchbountiesthat hackersdonate. OVER24% REWARDS A HOUSE FOR MOM AND A DONATION FOR GOOD SAM The most meaningful purchase I made with bounty money is actually a car. For a really long time it was just one car in our house of three, and I really donโ€™t come from a wealthy background. It was really an issue trying to find a way to get around for everyoneโ€™s jobs, so when I got into bug bounty I said, Iโ€™m going to get a car that everyone can use and I think it really helped.
  • 13. NION, OVER THE LAST YEAR, WHAT BEST DESCRIBES COMPANIESโ€™ ECEIVING VULNERABILITY REPORTS FROM SECURITY RESEARCHERS? THEY ARE FAR MORE OPEN: 33.8% THEY ARE SOMEWHAT MORE OPEN: 38.4% THEY ARE NEITHER MORE NOR LESS OPEN: 16.5% THEY ARE SOMEWHAT LESS OPEN: 4.7% THEY ARE FAR LESS OPEN: 4.7% HackerOne has paid out over $23 million in bounties in five years with a goal of $100 million by the end of 2020. In Your Opinion, Over the Last Year, What Best Describes Companies' Reactions to Receiving Vulnerability Reports From Security Researchers? THE FUTURE MORE COMPANIES PAYING MORE BOUNTIES NION, OVER THE LAST YEAR, WHAT BEST DESCRIBES COMPANIESโ€™ ECEIVING VULNERABILITY REPORTS FROM SECURITY RESEARCHERS? THEY ARE FAR MORE OPEN: 33.8% THEY ARE SOMEWHAT MORE OPEN: 38.4% THEY ARE NEITHER MORE NOR LESS OPEN: 16.5% THEY ARE SOMEWHAT LESS OPEN: 4.7% THEY ARE FAR LESS OPEN: 4.7%
  • 14. BRETT At the end of the day, weโ€™re all in this together. Weโ€™re trying to find stuff and fix issues. Weโ€™re trying to help protect the world. Thatโ€™s what it comes down to. And I like to be a part of that. THE HACKERS #TOGETHERWEHITHARDER