HackerOne

The HackerOne Blog

  • From Zero to Hero:  Your Guide to Building a Bug Bounty Program With HackerOne

    From Zero to Hero: Your Guide to Building a Bug Bounty Program With HackerOne

    Jump to a section:What is a bug bounty program?Benefits of a bug bounty programKey elements for a successful bug bounty programNavigating common challenges in bug bounty programsInvolving your...

    Read Article
  • Re-live the Security@ magic in our on-demand video library!

    Take me there!
  • HackerOne Company Values Matter: Execute with Excellence

    HackerOne Company Values Matter: Execute with Excellence

    Since its inception, the Execute with Excellence Award has had three remarkable recipients. Each one shares a unique perspective on what this award and HackerOne's values mean to them.Meet...

    Read Article
  • NIST CSF 2.0 and Pentesting: What You Need to Know

    NIST CSF 2.0 and Pentesting: What You Need to Know

    In 2014, the National Institute of Standards and Technology (NIST), recognizing the importance of protecting U.S. systems and data against cyberattack, issued its CyberSecurity Framework (CSF). ...

    Read Article
  • Hack My Career: Advice from HackerOne Employees

    Hack My Career: Advice from HackerOne Employees

    Today, we gathered insights from five HackerOne employees offering career advice to illuminate this journey and provide guidance.Kayla Underkoffler, Senior Security Technologist in Pennsylvania,...

    Read Article
  • HackerOne's List of Top 10 AI EMB(arrassments)

    HackerOne's List of Top 10 AI EMB(arrassments)

    Unlike traditional security flaws, which typically result in data breaches or service disruptions, AI systems can also cause embarrassment through errors in judgment, biased decision-making, or...

    Read Article
  • 3 Bug Bounty Lessons From Retail & eCommerce Customers

    3 Bug Bounty Lessons From Retail & eCommerce Customers

    How do security vulnerabilities uniquely impact the retail and eCommerce space, and how can retail and eCommerce organizations use ethical hackers to mitigate risk? We spoke with several HackerOne...

    Read Article
  • GDPR and Pentesting: What You Need to Know

    GDPR and Pentesting: What You Need to Know

    Personal data, also referred to as PII (personally identifiable information) is any piece of data or information that can be used to identify a person. A few examples of personal data are:...

    Read Article
  • 5 Bug Bounty Insights From SIX Group

    5 Bug Bounty Insights From SIX Group

    1. Why VDP and Bug Bounty?At SIX Group, Alex Hagenah emphasized the year-round success of going beyond the regulatory requirements of the financial services industry.“We’re a highly regulated...

    Read Article
  • Embracing Resilience: HackerOne's Approach to Disaster Recovery

    Embracing Resilience: HackerOne's Approach to Disaster Recovery

    So, What Is Disaster Recovery?In the dynamic world of tech, things can break – sometimes due to our actions, but it can also be due to external factors like provider outages. That's where Disaster...

    Read Article
  • HackerOne Applauds Senator Warner’s Support for Legal Protection of AI Red Teaming

    HackerOne applauds Senator Mark Warner’s support for expanding protections for good-faith AI research under the Digital Millennium Copyright Act (DMCA) Section 1201. HackerOne has pointed out that...

    Read Article
  • HackerOne Spot Checks for On-Demand, Targeted Security Testing

    HackerOne Spot Checks for On-Demand, Targeted Security Testing

    Should teams prioritize conducting thorough security checks or accelerating product timelines? Striking a balance between these competing priorities is essential, as overlooking security measures...

    Read Article
  • AI Developers’ AMA: AI System Design and Development

    AI Developers’ AMA: AI System Design and Development

    During our recent webinar, Beyond the Algorithm: AI Developers’ Ask-Me-Anything, four seasoned AI engineers discussed details and questions about applied AI and machine learning (ML). They focused...

    Read Article
  • What You Need to Know About the EU’s Cyber Resilience Act

    What You Need to Know About the EU’s Cyber Resilience Act

    The CRA Introduces Mandatory Cybersecurity RequirementsThe European CRA creates mandatory cybersecurity requirements for hardware and software with digital elements. The Act’s reach is broad,...

    Read Article
  • Security@: The Top 3 Bug Bounty Lessons From Security Leaders

    Security@: The Top 3 Bug Bounty Lessons From Security Leaders

    HackerOne’s Security@ conferences are exclusive events that bring together customers, hackers, and industry experts to share opinions and advice about building resilient security programs.Security...

    Read Article
  • How a Business Logic Vulnerability Led to Unlimited Discount Redemption

    How a Business Logic Vulnerability Led to Unlimited Discount Redemption

    It sounds straightforward enough, but business logic vulnerabilities can result in an array of serious security issues, such as unauthorized access, bypassing rate limits, or in the case of a...

    Read Article
  • How Hackers Help Jedox Secure Cloud Assets and Stay One Step Ahead

    How Hackers Help Jedox Secure Cloud Assets and Stay One Step Ahead

    Jedox was recently named a Leader in the Gartner Magic Quadrant for Financial Planning Software. One criterion related to being named to the Leader quadrant is how mature an organization is when...

    Read Article
  • Winning Together Through Synergy and Vulnerabilities

    Winning Together Through Synergy and Vulnerabilities

    As a recipient of HackerOne's prestigious 2024 'Win as a Team' award, I'm excited to share my thoughts on what drives collective success. This particular award, 'Win as a Team,' emphasizes...

    Read Article
  • Community-driven PTaaS vs. Automated Pentesting

    Community-driven PTaaS vs. Automated Pentesting

    Modern pentesting approaches use independent security researchers working under strict NDAs and advanced software platforms to streamline the process. However, with many vendors focusing on other...

    Read Article
  • What Is a Vulnerability Disclosure Program and Do You Need One?

    What Is a Vulnerability Disclosure Program and Do You Need One?

    What Is a Vulnerability Disclosure Program?A VDP is a structured method for anyone to report vulnerabilities. VDPs should include a process for receiving a vulnerability report, prioritizing and...

    Read Article
  • How Ethical Hackers Are Securing Elections

    How Ethical Hackers Are Securing Elections

    Coordinated Vulnerability Disclosure (CVD) or Vulnerability Disclosure Policies (VDP) for technology are key components of a security strategy that builds trust with users and stakeholders. A VDP...

    Read Article
  • Loading More...