Skip to main content
Notification Message
h1 Validation: built to turn AI findings into verified fixes |
Learn More

User account menu

  • Login
  • Leaderboard
  • Contacted by a hacker?

Home

Main navigation

  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Human-led & Agentic Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
    • HackerOne for Hackers
    • Learn to Hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
Get Started
Home
HackerOne

Main navigation

  • Platform
  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Human-led & Agentic Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
  • Researchers
    • HackerOne for Hackers
    • Learn to Hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
  • Get Started
  • Login

Image
HackerOne Blog
Exposure Management
Security Highlights: New CWE Rankings, Software Supply Chains, and Side-Channel Attacks
July 5, 2022
MITRE Releases 2022 CWE Top 25 The popular CWE Top 25 list, which ranks the...
Read Now
Image
DevSecOps laptop and computer screen
5 Security Stages of the DevSecOps Pipeline
June 28, 2022
5 Security Stages In-Depth A typical DevOps pipeline contains eight stages. The DevSecOps pipeline retains...
Read Now
Image
H1-2204 cover image
Crowdsourced Security
PayPal's Third LHE Brings Top Global Hackers to the Virtual Stage
July 29, 2022
PayPal has been partnering with the hacker community since launching a bug bounty program in...
Read Now
Image
DevOps DevSecOps
DevSecOps vs DevOps: What is the Difference?
June 23, 2022
In this article, we’ll explain what DevSecOps is, how it differs from DevOps, and what...
Read Now
Image
How Bug Bounty Uncovered A 5-Year-Old Vulnerability In Hours
Exposure Management
How Bug Bounty Uncovered A 5-Year-Old Vulnerability In Hours
June 16, 2022
When PullRequest was acquired, these concerns became HackerOne’s challenges. When we finalized the acquisition, we...
Read Now
Image
Overlooked Server Permissions
The Most Overlooked Server Permission Checks
June 23, 2022
We previously looked at common server authentication issues we see in code review and offered...
Read Now
Image
HackerOne triager performing bug triage best practices
Exposure Management
HackerOne’s In-Depth Approach to Vulnerability Triage and Validation
March 14, 2024
Not all VDP triage teams and workflows are created equal. Learn how HackerOne approaches vulnerability triage and validation.
Read Now
Image
Mental Health Blog
Hacker's Health: Adverse Effects of Doomscrolling
June 27, 2022
Question: "I spend the majority of my time researching and keeping up with current affairs...
Read Now
Image
Common Security Issues
The Top 5 Most Common Security Issues I Discover When Reviewing Code
June 10, 2022
NOTE: The following code examples have been contrived to provide detailed, illustrative representations of real...
Read Now
Image
CISOs: Do You Know M&A Security Risks?
Exposure Management
CISOs: Do You Know the Security Risks of Your Organization's Next M&A?
June 14, 2022
First, I will discuss the inherent risks associated with M&As as attack surfaces grow. A...
Read Now

Pagination

  • First page
  • Previous page
  • …
  • Page 51
  • Page 52
  • Page 53
  • Page 54
  • Page 55
  • Page 56
  • Page 57
  • Page 58
  • Page 59
  • …
  • Next page
  • Last page
Home
Contacted by a hacker?
Menu 1
Company
Leadership
Careers
Partners
Newsroom
Contact Us
Menu 2
Knowledge Center
Application Security
Penetration Testing
AI Red Teaming
Hacking
Cybersecurity Attacks
CTEM
Menu 3
Resources
Blog
Documentation
Leaderboard
Partner Portal
Resources
Facebook
X
Linkedin
Instagram

Menu Bottom
Policies
Terms
Privacy
Security
Trust
Right Reserved
©2026 HackerOne All rights reserved.