Skip to main content
Notification Message
h1 Validation: built to turn AI findings into verified fixes |
Learn More

User account menu

  • Login
  • Leaderboard
  • Contacted by a hacker?

Home

Main navigation

  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Human-led & Agentic Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
    • HackerOne for Hackers
    • Learn to Hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
Get Started
Home
HackerOne

Main navigation

  • Platform
  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Human-led & Agentic Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
  • Researchers
    • HackerOne for Hackers
    • Learn to Hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
  • Get Started
  • Login

Image
HAC Improve S&D
Exposure Management
How to Use Bug Bounty Program Data to Improve Security and Development
November 2, 2021
At HackerOne’s 2021 Security@ conference, two experienced HackerOne program managers, Allie Lugton and Denzel Duncan...
Read Now
Image
hac and bb
Exposure Management
Bug Bounty vs. VDP | Which Program Is Right for You?
November 4, 2021
What Are the Key Differences Between Bug Bounty and VDPs? A VDP is a structured...
Read Now
Image
general
Exposure Management
DOD's DIB-VDP Pilot Hits Six Month Milestone
October 29, 2021
Read more on this history of the DOD DIB-VDP pilot here
Read Now
Image
Jedox CTO
Offensive Security
Crowdsourced Security
Jedox’s Journey with HackerOne: A Q&A with CTO, Vladislav Maličević
October 28, 2021
*Editor's note: A security researcher is anyone who investigates a potential security issue in some...
Read Now
Image
HAC Vuln Disc
Exposure Management
Vulnerability Disclosure | What’s the Responsible Solution?
October 28, 2021
What Is a Vulnerability Disclosure? During a vulnerability disclosure, individuals report security weaknesses in computer...
Read Now
Image
VDP
Exposure Management
What Is a Vulnerability Disclosure Program and Do You Need One?
May 14, 2024
Are you wondering about Vulnerability Disclosure Programs (VDPs)? Here’s why you need one, and instructions on starting one or improving your current process.
Read Now
Image
Bug bounty for DevSecOps
Exposure Management
DevSecOps: How GitHub Bridges the Gap Between Security and Development
March 19, 2024
As a company that prizes security while serving tens of millions of developers worldwide, GitHub...
Read Now
Image
HAC Trustpilot
Crowdsourced Security
How Trustpilot Manages Risk by Working with Ethical Hackers
October 14, 2021
Trustpilot, a cloud-first company with little physical infrastructure, relies on external security testing to ensure...
Read Now
Image
HAC Cloud Security
Exposure Management
How Hackers Can Strengthen Cloud Security for Applications
November 11, 2021
What Does the Rise of Cloud Mean? According to Bressers, “It was easy to believe...
Read Now
Image
HAC BBB
Exposure Management
Crowdsourced Security
Bug Bounty Benefits | Why You Need a Bug Bounty Program
October 6, 2021
What Are the Benefits of Bug Bounties? A bug bounty program is a cost-effective way...
Read Now

Pagination

  • First page
  • Previous page
  • …
  • Page 57
  • Page 58
  • Page 59
  • Page 60
  • Page 61
  • Page 62
  • Page 63
  • Page 64
  • Page 65
  • …
  • Next page
  • Last page
Home
Contacted by a hacker?
Menu 1
Company
Leadership
Careers
Partners
Newsroom
Contact Us
Menu 2
Knowledge Center
Application Security
Penetration Testing
AI Red Teaming
Hacking
Cybersecurity Attacks
CTEM
Menu 3
Resources
Blog
Documentation
Leaderboard
Partner Portal
Resources
Facebook
X
Linkedin
Instagram

Menu Bottom
Policies
Terms
Privacy
Security
Trust
Right Reserved
©2026 HackerOne All rights reserved.