Platform for detecting errors and security vulnerabilities HackerOne announced A round of financing this week, raising capital to $ 110 million. Benchmark, New Enterprise Associates, Dragoneer Investment Group and EQT Ventures all participated in the over-subscribed Series D round, with a total volume of $ 36.4 million.
HackerOne will use today's round to expand global market reach, expand offerings and further strengthen the hacker community.
The California-based company provides a platform where security researchers and white-hat hackers can identify security vulnerabilities for its more than 1,500 customers, including Twitter, Airbnb, Uber, Yelp, and the Department of Defense. In fact, state bug buggy programs have more than doubled in the last 12 months alone. During this time, customers have resolved more than 30,500 vulnerabilities.
Founded in 2012, hackers have found over 120,000 security holes on the HackerOne platform and received over $ 51 million in bug bounties. With an average of $ 3,400 being paid for critical vulnerabilities, some hackers can make finding errors on the HackerOne platform a profession. And while it's not specifically about winning millionaires, the company helped six hackers earn more than $ 1 million each by exposing vulnerabilities.
David Obrand, Partner at Valor Equity Partners, joins HackerOne's Board of Directors. "HackerOne is leading a new wave of cyber security companies tackling the unique challenges posed by rapid growth and more complex attack surfaces," said Obrand. "Hack-based security is there to stay, and with its huge customer and hacker community, HackerOne dominates the market. I am very pleased to join the Board of Directors and be part of the next level of growth and innovation. "
HackerOne has offices in London, New York, Singapore and the Netherlands. In 2017, the company acquired the Favorite FinDEVr debut Award for his presentation at FinDEVr New York and won the crowd pleaser Award at his Findevr London presentation, Mårten Mickos is Managing Director.
Note: We are not the author of this content. For the Authentic and complete version,
Check its Original Source