Skip to main content
Notification Message
Hai Agentic - Smarter AI for Faster Risk Reduction |
Learn More

User account menu

  • Login
  • Leaderboard
  • Contacted by a hacker?

Home

Main navigation

  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Programmatic, On-demand Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Why HackerOne
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
    • HackerOne for Hackers
    • Learn to hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
Get Started
Home
HackerOne

Main navigation

  • Platform
  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Programmatic, On-demand Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Why HackerOne
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
  • Researchers
    • HackerOne for Hackers
    • Learn to hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
  • Get Started
  • Login

The terrifying rise of 'voice cloning' scams: How hackers can use AI to replicate your voice before placing fake panicked calls to friends or family pleading them to send money

The terrifying rise of 'voice cloning' scams: How hackers can use AI to replicate your voice before placing fake panicked calls to friends or family pleading them to send money

February 22nd, 2024
Daily Mail
https://www.dailymail.co.uk/sciencetech/article-13088183/hacker-clone-VOICE-fak…

Welcome to the Era of BadGPTs

Welcome to the Era of BadGPTs

February 29th, 2024
The Wall Street Journal
https://www.wsj.com/articles/welcome-to-the-era-of-badgpts-a104afa8?mod=hp_mino…
Image
employees join a virtual meeting to plan hack week
How HackerOne Organizes a Remote Hack Week
July 17th, 2024
This year's Hack Week was dedicated to artificial intelligence (AI), and teams worked together to...
Read Now
Image
interview employee waiting
Feedback-Driven Interviewing at HackerOne
July 11th, 2024
The Talent Acquisition team currently has a net promoter score (NPS) of 56%, while the...
Read Now
Image
Retail vulnerabilities
Exposure Management
Common Ecommerce Vulnerabilities: Reflected XSS
June 27th, 2024
With an example from Shopify, learn about the impact of Reflected XSS vulnerabilities in ecommerce.
Read Now
Image
hackerone rainbow shirts employee pride
Pride Month: Stories from Our LGBTQ+ Employees
June 25th, 2024
We believe in fostering an environment where everyone feels valued and empowered to be their...
Read Now
Image
An ethical hacker finding an XSS vulnerability
Code Security
Security Research
How to Find XSS
June 25th, 2024
Security researcher Haoxi Tan breaks down the best practices and tools for finding the different types of XSS vulnerabilities.
Read Now
Image
women females girls engineering hack
Celebrating International Women in Engineering Day
June 23rd, 2024
While there has been progress in increasing the number of women in engineering roles, the...
Read Now
Image
employees working in an open office space virtual
Sales Development Representatives Win as a Team
June 20th, 2024
In the following interview, Jessica discusses how she embodies HackerOne’s Win as a Team company...
Read Now
Image
execute with excellence graphic of hand holding trophy
HackerOne Company Values Matter: Execute with Excellence
June 6th, 2024
Since its inception, the Execute with Excellence Award has had three remarkable recipients. Each one...
Read Now

Pagination

  • First page
  • Previous page
  • …
  • Page 28
  • Page 29
  • Page 30
  • Page 31
  • Page 32
  • Page 33
  • Page 34
  • Page 35
  • Page 36
  • …
  • Next page
  • Last page
Home
Contacted by a hacker?
Menu 1
Company
Leadership
Careers
Partners
Newsroom
Contact Us
Menu 2
Knowledge Center
Application Security
Penetration Testing
AI Red Teaming
Hacking
Cybersecurity Attacks
CTEM
Menu 3
Resources
Blog
Documentation
Leaderboard
Partner Portal
Resources
Facebook
X
Linkedin
Instagram

Menu Bottom
Policies
Terms
Privacy
Security
Trust
Right Reserved
©2025 HackerOne All rights reserved.