Skip to main content
Notification Message
Hai Agentic - Smarter AI for Faster Risk Reduction |
Learn More

User account menu

  • Login
  • Leaderboard
  • Contacted by a hacker?

Home

Main navigation

  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Programmatic, On-demand Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Why HackerOne
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
    • HackerOne for Hackers
    • Learn to hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
Get Started
Home
HackerOne

Main navigation

  • Platform
  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Programmatic, On-demand Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Why HackerOne
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
  • Researchers
    • HackerOne for Hackers
    • Learn to hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
  • Get Started
  • Login

Image
Ethical hackers fixing improper access control vulnerabilities
Exposure Management
How an Improper Access Control Vulnerability Led to Account Theft in One Click
November 6th, 2024
Let’s look more closely at the improper access control vulnerability type — what it is, how it’s used, and how to remediate it.
Read Now
Image
Software engineer using AI prompting for security vulnerabilities
How to Use AI Prompting for Security Vulnerabilities
February 6th, 2024
Zahra Putri Fitrianti explores the power of AI prompting for security vulnerabilities at HackerOne.
Read Now
Image
Abstract 3D textures
Offensive Security
Recap: Elite Pentesters Tell All in a Live Q&A
January 25th, 2024
Three elite HackerOne pentesters recently shared their stories in a live AMA session that looked at the impact and results of community-driven pentesting.
Read Now
Image
Developers finding code vulnerabilities with code security audit
Exposure Management
Offensive Security
How to Find Mistakes Earlier and Save Money With Code Security Audit
January 18th, 2024
Learn how organizations can find mistakes earlier and save an average of $18,037 using Code Security Audit.
Read Now
Image
Ethical hacker finding XSS vulnerabilities
Exposure Management
How a Cross-Site Scripting Vulnerability Led to Account Takeover
November 4th, 2024
Cross-site scripting (XSS) is the number one most common security vulnerability. Learn what XSS is, its impacts, and how to prevent it.
Read Now
Image
Abstract technology
Exposure Management
HackerOne Partners With Semgrep to Combine Expert Code Review With Powerful Automation
January 11th, 2024
HackerOne's partnership with Semgrep harnesses the power of automation and combines it with expert code review.
Read Now
Image
Election integrity through coordinated vulnerability disclosure
Security Compliance
Public Policy
How Coordinated Vulnerability Disclosure Can Boost Election Integrity and Public Perception
January 4th, 2024
A panel of experts in election security and Coordinated Vulnerability Disclosure (CVD) convened to share advice and best practices with a small group of U.S. election officials.
Read Now
Image
Security leaders at SEGA and Six Group discuss the value of VDP and bug bounty
SEGA and SIX Group: The Value of VDP and Bug Bounty
December 20th, 2023
SEGA Europe and SIX Group discuss the power of bug bounty and vulnerability disclosure programs (VDPs) with HackerOne.
Read Now
Image
Ethical hackers performing AI Red Teaming with HackerOne
Public Policy
AI
AI Red Teaming
Unlocking Trust in AI: The Ethical Hacker's Approach to AI Red Teaming
December 19th, 2023
HackerOne offers robust AI Red Teaming services that help organizations bolster the security, fairness, and reliability of their AI deployments.
Read Now
Image
Spain team wins the Ambassador World Cup Finals 2023
Crowdsourced Security
The 2023 Ambassador World Cup Final: Results, Impact, and Looking Ahead
December 14th, 2023
The final round of the 2023 Ambassador World Cup was an immense success.
Read Now

Pagination

  • First page
  • Previous page
  • …
  • Page 7
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • …
  • Next page
  • Last page
Home
Contacted by a hacker?
Menu 1
Company
Leadership
Careers
Partners
Newsroom
Contact Us
Menu 2
Knowledge Center
Application Security
Penetration Testing
AI Red Teaming
Hacking
Cybersecurity Attacks
CTEM
Menu 3
Resources
Blog
Documentation
Leaderboard
Partner Portal
Resources
Facebook
X
Linkedin
Instagram

Menu Bottom
Policies
Terms
Privacy
Security
Trust
Right Reserved
©2025 HackerOne All rights reserved.