Skip to main content

Vulnerability Management

We cover everything in vulnerability management including discovery, prioritization, assessment, disclosure, and remediation.

HackerOne Blog - Header Graphic 8
Company News, Vulnerability Management, Ethical Hacker

Introducing Program Levels: Hacker-friendly Practices that Improve Program Results

The ethical hacker community is one of the most powerful security resources available to any organization. We’ve worked with this community firsthand...

HackerOne Blog - Header Graphic 8
Company News, Vulnerability Management, Ethical Hacker

Introducing Program Levels: Hacker-friendly Practices that Improve Program Results

The ethical hacker community is one of the most powerful security resources available to any organization. We...

HackerOne Assets
Vulnerability Management, Company News

Introducing HackerOne Assets

Understanding where the critical flaws lie within your organization's attack surface is critical—but...

Application Security, Penetration Testing, Vulnerability Management

Introducing Unified HackerOne Scope Management with Burp Suite Support

This post will start with the basics of defining scope and how ethical hackers and testers use it in their...
HackerOne Blog
Penetration Testing, Vulnerability Management

Benchmark Analysis: Annual Pentest and Code Review Coverage

Security leaders often struggle to keep pace with the evolving nature of their respective attack surfaces...
Bug Bounty Programs
Vulnerability Management

5 Articles to Get You Up-to-Speed on Bug Bounty Programs

Many organizations use bug bounty programs to help them protect their ever-expanding attack surface and...

HackerOne Blog
Application Security, Vulnerability Management

Security Highlights: New CWE Rankings, Software Supply Chains, and Side-Channel Attacks

MITRE Releases 2022 CWE Top 25 The popular CWE Top 25 list, which ranks the most dangerous software...
HackerOne Blog
Vulnerability Management

HackerOne’s In-Depth Approach to Vulnerability Triage and Validation

Like triaging in a hospital emergency room, security issues must be diagnosed and handled by an expert as soon...
How Bug Bounty Uncovered A 5-Year-Old Vulnerability In Hours
Ethical Hacker, Vulnerability Management

How Bug Bounty Uncovered A 5-Year-Old Vulnerability In Hours

When PullRequest was acquired, these concerns became HackerOne’s challenges. When we finalized the acquisition...