Skip to main content

Application Security

Learn how to prevent vulnerabilities in your applications. We cover current practices in application security, cloud security, API testing, and more.

pullrequest5ways
Application Security

5 Ways I Provide Value as a PullRequest Reviewer When I Start Reviewing a New Project

Important reviewer traits for providing a great code review include prior knowledge and experience, expertise, background context, attention to detail...

pullrequest5ways
Application Security

5 Ways I Provide Value as a PullRequest Reviewer When I Start Reviewing a New Project

Important reviewer traits for providing a great code review include prior knowledge and experience, expertise...

HackerOne announces PullRequest acquisition
Company News, Application Security

Why HackerOne Acquired Pull Request and What It Means to Our Customers

Security vulnerabilities are a significant workflow disruption when discovered near the end of development...
How Wix Uses HackerOne to Improve Their Cybersecurity Posture
Customer Stories, Application Security, Best Practices, Bounty, Vulnerability Management

How Wix Improves Their Security Posture with Ethical Hackers

Reducing risk is fundamental to Wix’s approach to cybersecurity, and as the threat landscape evolves, they...

Top 5 Cloud
Application Security

The Top 5 Cloud Security Risks: How Hacker-Powered Security Can Help

Widespread digital transformation means increased cloud security risk. Learn how human intelligence—hacker...

HAC AWS
Penetration Testing, Ethical Hacker, Application Security

HackerOne Announces Hacker-Powered Cloud Security Capabilities for AWS Customers 

HackerOne announces new capabilities for AWS customers looking to improve security in their cloud applications...

DOD seal
Vulnerability Disclosure, Customer Stories, Best Practices, Application Security, Response

The DOD Improves Their Security Posture Through the DIB-VDP

One of the primary missions of the Defense Counterintelligence and Security Agency (DCSA) is to provide...

How the Industry’s First Hacker-Powered API Helps Hackers Automate Workflows
Application Security

How the Industry’s First Hacker-Powered API Helps Hackers Automate Workflows

Today, HackerOne is launching the industry’s first hacker API. This release is now out of beta and is...
Spotlight on the Server-Side
Application Security, Data and Analysis

Spotlight on the Server-Side

Server-side request forgery (or SSRF) vulnerabilities are particularly dangerous because they can lead to...