05.04.2023 1 min read Interview for ICT Security Network News - Juraj Bednar For IT Security Network News magazine, we published an interview with our co-owner Juraj Bednar...
02.03.2023 1 min read Interview for ICT Security Network News - Pavol Luptak For IT Security Network News magazine, we published an interview with our co-owner Pavel Luptak...
15.10.2018 5 min. read Why is Hacktrophy a better deal than competition The interest in the bug bounty programs as an innovative form of IT security testing is constantly...
17.06.2018 11 min. read Our first year with bug bounty programs The first Central European bug bounty program, Hacktrophy, is celebrating a year of existence. Building a service of this kind in the heart of Europe hasn’t been an easy task. We decided to...
01.06.2018 8 min. read Using bug bounty programs in Europe Security testing through bug bounty programs has been present in the world for decades. Although...
18.05.2018 3 min. read We have a new website and test packages for everyone The Hacktrophy website has been redesigned in recent days. The goal was to create a more...
30.04.2018 7 min. read Cases of hacking of large global companies There is a high probability that the company you use has already become the target of a cyber attack and your sensitive data was also at stake. Every day, 5 100 000 sensitive data is stolen or...
16.03.2018 13 min read Consequences of a successful hacker attack on the business The risk that some black-hat hacker will attack your business increases every year. In Slovakia...
28.11.2017 10 min. read Penetration tests vs. bug bounty programs – comparison How to choose the right way to test security of website or application? When are the automated...
18.11.2017 8 min. read IT security: Which programming language is the safest? In terms of IT security, we can apply the principle of the weakest article. It’s crucial...