Skip to main content

Application Security

Learn how to prevent vulnerabilities in your applications. We cover current practices in application security, cloud security, API testing, and more.

Blog
Penetration Testing, Application Security

What Your Organization Gains by Understanding the Value of App Security Testing Averages

Daily and weekly agile software releases include bug fixes and security patches alongside new functionality. As a result, new vulnerabilities are...

A Guide To Subdomain Takeovers
Application Security, Hacker Resources

A Guide To Subdomain Takeovers

Technical guide on how to understand, find, exploit, and report subdomain misconfigurations by EdOverflow

Advanced triggers feature launches to further improve signal
Application Security, New Features

Advanced triggers feature launches to further improve signal

Triggers are simple but powerful tools for executing automated responses to new, incoming reports. With...

GitHub Celebrates Four Years of Bug Bounties: Q&A with VP of Security, Shawn Davenport
Application Security, Customer Stories, Bounty

GitHub Celebrates Four Years of Bug Bounties: Q&A with VP of Security, Shawn Davenport

GitHub celebrated the fourth anniversary of its Security Bug Bounty program and released a comprehensive recap...

OWASP Top 10 Web Security Risks of 2017 - Flashcards
Application Security, Company Resources

OWASP Top 10 Web Security Risks of 2017 - Flashcards

There’s no such thing as perfectly secure software. Learn about the top 10 web security risks of 2017 with our...

U.S. Senate Hearing - Data Security and Bug Bounty Programs: Lessons Learned
Application Security, News

U.S. Senate Hearing - Data Security and Bug Bounty Programs: Lessons Learned

HackerOne was invited to testify in front of the U.S. Senate Subcommittee on Consumer Protection, Product...

Alex Rice and Zane Lackey Discuss Modern Security for Practitioners
Application Security, Company Resources

Alex Rice and Zane Lackey Discuss Modern Security for Practitioners

Our co-founder and CTO, Alex Rice, was a recent guest on The Modern Security Series by Signal Sciences, along...

5 Hacker-Powered Trends You Need to Know About
Application Security, Data and Analysis, Hacker Powered Security Report

5 Hacker-Powered Trends You Need to Know About

For your quick reference, we’ve distilled the Hacker-Powered Security Report to 5 key trends that show how...

Tor Project Launches Public Bug Bounty Program | Q&A with Tor Browser Team Lead, Georg Koppen
Application Security, New Program Launch

Tor Project Launches Public Bug Bounty Program | Q&A with Tor Browser Team Lead, Georg Koppen

In January 2016, the Tor Project launched its first private bug bounty program on HackerOne. Today the Tor...