Blog

Home > Blog

Blog

Browse by Category

Recent Posts

Citrix’s Hacker-Powered Security Growth Plan: Q&A with Abhijith Chandrashekar

We recently sat down with Abhijith Chandrashekar, PSIRT Manager at Citrix, to discuss why Citrix continues to expand their bug bounty program and learn about their cloud security and scope expansion plans. Read on to see what he had to say.

HackerOne
Read More

What is Penetration Testing? How Does It Work Step-by-Step?

Penetration testing, aka pen testing or ethical hacking, attempts to attempt to breach a system's security for the purpose of vulnerability identification. Testing is done in an authorized and structured manner to report and rectify so that weaknesses can be reported and rectified.

HackerOne
Read More

60 days of insights from the DoD’s Defense Industrial Base Vulnerability Disclosure Program Pilot

It's been 60 days since the DoD's Defense Industrial Base Vulnerability Disclosure Program (DIB-VDP) pilot launched. In this blog, DC3 and HackerOne sit down to talk about the pilot’s early successes, learnings to date, and their goals for the future.

HackerOne
Read More

Announcing Hack the Army 3.0 Results: A Conversation with Defense Digital Service, U.S. Army, and Hack the Army 3.0’s Top Hacker

HackerOne sat down with DDS and Army program leaders and one of the security researchers who hacked the Army. We discussed why Hack the matters, the results that were uncovered in Hack the Army 3.0, and their plans for the future of cybersecurity within the DoD and the U.S. Military. Read on to see what they had to say.

HackerOne
Read More

HackerOne in DevSecOps 

Hundreds of HackerOne customers use our platform in their application security processes. For the most part, these are organizations using bug bounty to find vulnerabilities in their deployed applications. But there is so much more that we can do for development teams

Tim Matthews
Read More

How HackerOne and GitHub Now Work Better Together


HackerOne
Read More

Build a Resilient Security Posture with Vulnerability Intelligence and Cybersecurity Ratings

Reducing risk is the fundamental reason organizations invest in cybersecurity. As the threat landscape grows and evolves, organizations need a proactive approach to building and protecting their security posture.

HackerOne
Read More

Hack Hard. Have Fun. Increase Security

In March, Amazon sponsored HackerOne’s 10-day, virtual hacking event, which attracted more than 50 security researchers to identify potential vulnerabilities across Amazon’s core assets. Read on for highlights from the event.

HackerOne
Read More

Microsoft Says: Russian SolarWinds Hackers Hit U.S. Government Agencies Again

Microsoft says the state-backed Russian hacker group Nobelium—the same actor behind the 2020 SolarWinds attacks—took control of the State Department’s United States Agency for International Development email system. This bold attack, expected to be ongoing, breached federal government supplier systems sending out official-looking emails to over 3,000 accounts across more than 150 organizations.

HackerOne
Read More

How Digital Transformation Changes An Organization's Security Challenges

Last week, HackerOne joined WhiteSource, AWS, and IGT for a roundtable discussion about the new security challenges of digital transformation. The panel discussed cloud security, software supply chain security, and vulnerability disclosure programs as examples of proactive approaches organizations can take to mitigate their risk.

HackerOne
Read More