Blog

Home > Blog

Blog

Browse by Category

Recent Posts

One Month of Learnings from Flo Health’s Bug Bounty Program: A Q&A with CISO, Leo Cunningham

The world’s most popular women’s health app, Flo Health, is responsible for the sensitive health data of 40 million women. With that much PII under their purview, Flo Health’s CISO knew that enabling his security team with the most advanced security testing methods was of the utmost importance to brand trust and user loyalty. 

HackerOne
Read More

Vulnerability Assessment I A Complete Guide

Wondering about vulnerability assessments? We give a full explanation of what vulnerability assessments are, how they work, and how they help prevent cyberattacks.

HackerOne
Read More

What We Can Learn From Recent Ransomware Attacks 

What can we learn from recent ransomware attacks where bad actors like REvil made over $120 million in 2020 alone? Organizations may have effective security but still fall prey to attacks due to supplier system vulnerabilities. Learn how you can use VDPs and hacker-powered security to stay safe.

HackerOne
Read More

How to Use HackerOne and PagerDuty to Identify When Vulnerabilities Need Action

Organizations rely on security testing to identify vulnerabilities, but how do they know when a vulnerability is critical and needs immediate attention? HackerOne and PagerDuty partnered to create a workflow automation integration that identifies when critical vulnerabilities need action minimizing cyber risk and remediation time.

HackerOne
Read More

How the Industry’s First Hacker-Powered API Helps Hackers Automate Workflows

Today, HackerOne is launching the industry’s first hacker API. This release is now out of beta and is available to the hacker community. It includes a collection of API endpoints that help automate common workflow tasks. In the past, hackers had to use the UI to complete repetitive tasks on the platform, with no supported mechanism to script or automate their workflows. With the new API, hackers can increase productivity and allocate more time towards creative bug hunting. 

HackerOne
Read More

What Are Bug Bounties? How Do They Work? [With Examples]

Looking for bug bounty examples? We’ll explain what bug bounties are, and show you how they work step-by-step using examples of actual bug bounties.

HackerOne
Read More

How HackerOne Positively Influences Zebra’s Software Development Life Cycle


HackerOne
Read More

The Top Cybersecurity Principles Every Board Member Must Know


Mårten Mickos
Read More

Bug Bounty vs. CTF [Understanding Differences & Benefits]

Trying to understand the difference between a bug bounty vs. CTF? We explain the differences, the similarities, and the benefits of each.

HackerOne
Read More

How Hackers Can Help Reduce Your Organization's Application Risk on AWS 

HackerOne recently hosted AWS and a panel of expert ethical hackers to discuss how Server-Side Request Forgery (SSRF) vulnerabilities and cloud misconfiguration are ripe environments for hackers to discover vulnerabilities and improve their skills. In addition, they both represent significant and multi-layered security risks for many organizations. 

HackerOne
Read More