Blog

Home > Blog > data and analysis

data and analysis

Browse by Category

Recent Posts

Organizations Paid Hackers $23.5 Million for These 10 Vulnerabilities in One Year

HackerOne report reveals cross-site scripting, improper access control, and information disclosure top list of most common and impactful vulnerabilities

HackerOne
Read More

Are Election Hacking Fears Driving Voters To The Polls?

If people fear that the American electoral infrastructure could be hacked, will they withhold their votes in November? Not according to research commissioned by HackerOne.

HackerOne
Read More

Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne

Vulnerabilities are a fact of life; risk comes with it. Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. Using 7 years of data from 1,400 bug bounty programs & 360,000+ valid vulnerabilities, this post offers a new analysis of the most common vulnerabilities not found on the OWASP top 10.

HackerOne
Read More

The HackerOne Top 10 Most Impactful and Rewarded Vulnerability Types

We’ve put together a list of the most impactful vulnerabilities on the HackerOne platform so you can see where to aim your security efforts and how to better align your security team to today’s biggest risks. Learn which vulnerabilities aren’t in the OWASP Top 10 and see the top vulnerabilities submitted by volume, bounty awards, and more.

HackerOne
Read More

How Hacker-Powered Security Protects Your Data, Even When Third Parties Don't

Providing third parties with access to privileged sites and information can expose companies to greater risk of data theft, with all the financial and reputational costs such breaches bring. Hacker-powered security programs like HackerOne Bounty let you focus tens to thousands of security researchers on the precise systems you care about most. Through careful design of the program page and bounty table, which tells hackers how much they will be paid to find different types of vulnerabilities in different systems, you can concentrate the HackerOne community on hardening the applications, authentication, and access control systems that third parties use. 

HackerOne
Read More

118 Fascinating Facts from HackerOne’s Hacker-Powered Security Report 2018

Read 118 of the most intriguing data points from HackerOne’s Hacker-Powered Security Report 2018. Get the facts to learn how security teams are working with hackers to crush more bugs and make the internet safer for everyone.

HackerOne
Read More

The Hacker-Powered Security Report 2018

The Hacker-Powered Security Report 2018 is the most comprehensive report on hacker-powered security. Analysis of 78,275 security vulnerability reports received in the past year from ethical hackers that reported them to over 1,000 organizations through HackerOne.

HackerOne
Read More

What percentage of your software vulnerabilities have GDPR implications?

Do you know how many of your unknown vulnerabilities have the potential to cause a breach of consumer data? In other words, how many have GDPR implications? We wondered the same thing, so we did some digging. Here’s what we found.

HackerOne
Read More

Better than Cyber Monday: Ecommerce and Retail Edition of The Hacker-Powered Security Report

Is the ecommerce and retail industry a pioneer or a laggard in using hacker-powered efforts in the fight against cyber criminals? And how does your retail company stack up against others in the industry? Find out with this new report, specifically for the ecommerce and retail industry, and using data culled from more than 800 hacker-powered security programs, over $20 million in awarded bounties, and nearly 50,000 resolved security vulnerabilities.

kwhite
Read More

5 Hacker-Powered Trends You Need to Know About

For your quick reference, we’ve distilled the Hacker-Powered Security Report to 5 key trends that show how white-hat hackers are shaping the world of security.

HackerOne
Read More