Image Exposure Management 5 Articles to Get You Up-to-Speed on Bug Bounty Programs July 7th, 2022 This article shares five valuable resources about bug bounty programs, why they are useful, how... Read Now
Image Exposure Management Security Highlights: New CWE Rankings, Software Supply Chains, and Side-Channel Attacks July 5th, 2022 MITRE Releases 2022 CWE Top 25 The popular CWE Top 25 list, which ranks the... Read Now
Image 5 Security Stages of the DevSecOps Pipeline June 28th, 2022 5 Security Stages In-Depth A typical DevOps pipeline contains eight stages. The DevSecOps pipeline retains... Read Now
Image Crowdsourced Security PayPal's Third LHE Brings Top Global Hackers to the Virtual Stage July 29th, 2022 PayPal has been partnering with the hacker community since launching a bug bounty program in... Read Now
Image DevSecOps vs DevOps: What is the Difference? June 23rd, 2022 In this article, we’ll explain what DevSecOps is, how it differs from DevOps, and what... Read Now
Image Exposure Management How Bug Bounty Uncovered A 5-Year-Old Vulnerability In Hours June 16th, 2022 When PullRequest was acquired, these concerns became HackerOne’s challenges. When we finalized the acquisition, we... Read Now
Image The Most Overlooked Server Permission Checks June 23rd, 2022 We previously looked at common server authentication issues we see in code review and offered... Read Now
Image Exposure Management HackerOne’s In-Depth Approach to Vulnerability Triage and Validation March 14th, 2024 Not all VDP triage teams and workflows are created equal. Learn how HackerOne approaches vulnerability triage and validation. Read Now
Image Hacker's Health: Adverse Effects of Doomscrolling June 27th, 2022 Question: "I spend the majority of my time researching and keeping up with current affairs... Read Now
Image The Top 5 Most Common Security Issues I Discover When Reviewing Code June 10th, 2022 NOTE: The following code examples have been contrived to provide detailed, illustrative representations of real... Read Now