HackerOne
The HackerOne Blog
-
From Zero to Hero: Your Guide to Building a Bug Bounty Program With HackerOne
Jump to a section:What is a bug bounty program?Benefits of a bug bounty programKey elements for a successful bug bounty programNavigating common challenges in bug bounty programsInvolving your...
-
Re-live the Security@ magic in our on-demand video library!
Take me there! -
HackerOne Company Values Matter: Execute with Excellence
Since its inception, the Execute with Excellence Award has had three remarkable recipients. Each one shares a unique perspective on what this award and HackerOne's values mean to them.Meet...
-
NIST CSF 2.0 and Pentesting: What You Need to Know
In 2014, the National Institute of Standards and Technology (NIST), recognizing the importance of protecting U.S. systems and data against cyberattack, issued its CyberSecurity Framework (CSF). ...
-
Hack My Career: Advice from HackerOne Employees
Today, we gathered insights from five HackerOne employees offering career advice to illuminate this journey and provide guidance.Kayla Underkoffler, Senior Security Technologist in Pennsylvania,...
-
HackerOne's List of Top 10 AI EMB(arrassments)
Unlike traditional security flaws, which typically result in data breaches or service disruptions, AI systems can also cause embarrassment through errors in judgment, biased decision-making, or...
-
3 Bug Bounty Lessons From Retail & eCommerce Customers
How do security vulnerabilities uniquely impact the retail and eCommerce space, and how can retail and eCommerce organizations use ethical hackers to mitigate risk? We spoke with several HackerOne...
-
GDPR and Pentesting: What You Need to Know
Personal data, also referred to as PII (personally identifiable information) is any piece of data or information that can be used to identify a person. A few examples of personal data are:...
-
5 Bug Bounty Insights From SIX Group
1. Why VDP and Bug Bounty?At SIX Group, Alex Hagenah emphasized the year-round success of going beyond the regulatory requirements of the financial services industry.“We’re a highly regulated...
-
Embracing Resilience: HackerOne's Approach to Disaster Recovery
So, What Is Disaster Recovery?In the dynamic world of tech, things can break – sometimes due to our actions, but it can also be due to external factors like provider outages. That's where Disaster...
-
HackerOne Applauds Senator Warner’s Support for Legal Protection of AI Red Teaming
HackerOne applauds Senator Mark Warner’s support for expanding protections for good-faith AI research under the Digital Millennium Copyright Act (DMCA) Section 1201. HackerOne has pointed out that...
-
HackerOne Spot Checks for On-Demand, Targeted Security Testing
Should teams prioritize conducting thorough security checks or accelerating product timelines? Striking a balance between these competing priorities is essential, as overlooking security measures...
-
AI Developers’ AMA: AI System Design and Development
During our recent webinar, Beyond the Algorithm: AI Developers’ Ask-Me-Anything, four seasoned AI engineers discussed details and questions about applied AI and machine learning (ML). They focused...
-
What You Need to Know About the EU’s Cyber Resilience Act
The CRA Introduces Mandatory Cybersecurity RequirementsThe European CRA creates mandatory cybersecurity requirements for hardware and software with digital elements. The Act’s reach is broad,...
-
Security@: The Top 3 Bug Bounty Lessons From Security Leaders
HackerOne’s Security@ conferences are exclusive events that bring together customers, hackers, and industry experts to share opinions and advice about building resilient security programs.Security...
-
How a Business Logic Vulnerability Led to Unlimited Discount Redemption
It sounds straightforward enough, but business logic vulnerabilities can result in an array of serious security issues, such as unauthorized access, bypassing rate limits, or in the case of a...
-
How Hackers Help Jedox Secure Cloud Assets and Stay One Step Ahead
Jedox was recently named a Leader in the Gartner Magic Quadrant for Financial Planning Software. One criterion related to being named to the Leader quadrant is how mature an organization is when...
-
Winning Together Through Synergy and Vulnerabilities
As a recipient of HackerOne's prestigious 2024 'Win as a Team' award, I'm excited to share my thoughts on what drives collective success. This particular award, 'Win as a Team,' emphasizes...
-
Community-driven PTaaS vs. Automated Pentesting
Modern pentesting approaches use independent security researchers working under strict NDAs and advanced software platforms to streamline the process. However, with many vendors focusing on other...
-
What Is a Vulnerability Disclosure Program and Do You Need One?
What Is a Vulnerability Disclosure Program?A VDP is a structured method for anyone to report vulnerabilities. VDPs should include a process for receiving a vulnerability report, prioritizing and...
-
How Ethical Hackers Are Securing Elections
Coordinated Vulnerability Disclosure (CVD) or Vulnerability Disclosure Policies (VDP) for technology are key components of a security strategy that builds trust with users and stakeholders. A VDP...
-
Loading More...