Skip to main content
Notification Message
Hai Agentic - Smarter AI for Faster Risk Reduction |
Learn More

User account menu

  • Login
  • Leaderboard
  • Contacted by a hacker?

Home

Main navigation

  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Programmatic, On-demand Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Why HackerOne
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
    • HackerOne for Hackers
    • Learn to hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
Get Started
Home
HackerOne

Main navigation

  • Platform
  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Programmatic, On-demand Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Why HackerOne
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
  • Researchers
    • HackerOne for Hackers
    • Learn to hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
  • Get Started
  • Login

Escalating Cybersecurity Crisis Grips Healthcare Sector: Ransomware Attacks Surge Across Industry Leaders

Escalating Cybersecurity Crisis Grips Healthcare Sector: Ransomware Attacks Surge Across Industry Leaders

December 14th, 2023
Electronic Health Reporter
https://electronichealthreporter.com/escalating-cybersecurity-crisis-grips-heal…

Zoom's Bug-Scoring System Prioritizes Riskiest Vulns for Cyber Teams

Zoom's Bug-Scoring System Prioritizes Riskiest Vulns for Cyber Teams

December 14th, 2023
DarkReading
https://www.darkreading.com/cybersecurity-analytics/zoom-bug-scoring-system-pri…

HackerOne Recognized In PTaaS Space

HackerOne Recognized In PTaaS Space

December 15th, 2023
TFIR
https://tfir.io/hackerone-recognized-in-ptaas-space/

2024 Cybersecurity Predictions from Industry Experts

2024 Cybersecurity Predictions from Industry Experts

December 16th, 2023
Solutions Review
https://solutionsreview.com/security-information-event-management/2024-cybersec…

Exclusive Interview: Google Cloud CISO Phil Venables Talks Ethical Hackers

Exclusive Interview: Google Cloud CISO Phil Venables Talks Ethical Hackers

December 16th, 2023
Techopedia
https://www.techopedia.com/google-ciso-cybersecurity-ethical-hackers

Will Putting a Dollar Value on Vulnerabilities Help Prioritize Them?

Will Putting a Dollar Value on Vulnerabilities Help Prioritize Them?

December 18th, 2023
DarkReading
https://www.darkreading.com/application-security/putting-dollar-value-vulnerabi…

What Do CISOs Have to Do to Meet New SEC Regulations?

What Do CISOs Have to Do to Meet New SEC Regulations?

December 19th, 2023
DarkReading
https://www.darkreading.com/cybersecurity-operations/what-do-cisos-have-to-do-t…

Enhancing pentesting strategy

Enhancing pentesting strategy

December 19th, 2023
teiss
https://www.teiss.co.uk/cyber-risk-management/enhancing-pentesting-strategy?Pre…

From hotels to casinos to resorts, the lesson is clear, the hospitality industry needs ethical hackers

From hotels to casinos to resorts, the lesson is clear, the hospitality industry needs ethical hackers

December 23rd, 2023
HospitalityNet
https://www.hospitalitynet.org/opinion/4119623.html

Evolving Cyber Threats in a World of AI: What Can We Expect From 2024?

Evolving Cyber Threats in a World of AI: What Can We Expect From 2024?

December 29th, 2023
CyberSecurity Magazine
https://cybersecurity-magazine.com/evolving-cyber-threats-in-a-world-of-ai-what…

Pagination

  • First page
  • Previous page
  • …
  • Page 34
  • Page 35
  • Page 36
  • Page 37
  • Page 38
  • Page 39
  • Page 40
  • Page 41
  • Page 42
  • …
  • Next page
  • Last page
Home
Contacted by a hacker?
Menu 1
Company
Leadership
Careers
Partners
Newsroom
Contact Us
Menu 2
Knowledge Center
Application Security
Penetration Testing
AI Red Teaming
Hacking
Cybersecurity Attacks
CTEM
Menu 3
Resources
Blog
Documentation
Leaderboard
Partner Portal
Resources
Facebook
X
Linkedin
Instagram

Menu Bottom
Policies
Terms
Privacy
Security
Trust
Right Reserved
©2025 HackerOne All rights reserved.