Image Exposure Management How an Information Disclosure Vulnerability Led to Critical Data Exposure November 5th, 2024 Information disclosure is the #2 most common security vulnerability. Learn what information disclosure is, its impacts, and how to prevent it. Read Now
Image Offensive Security Decoding the Characteristics of Modern Pentesting: Effectiveness March 20th, 2024 HackerOne pentest experts explore the "Effectiveness" factor of pentesting methods to see how each security testing alternative measures up. Read Now
Image AI Safety vs. AI Security March 14th, 2024 What's the difference between AI safety and AI security — and is AI Red Teaming the solution for both? Read Now
Image Exposure Management Shift Left is Dead: A Post Mortem March 13th, 2024 Shift left is dead. What now? Read Now
Image NCSC Recognises The Work Of Ethical Hackers With An Appreciation Event March 12th, 2024 The NCSC recognized the work of ethical hackers in its VRS program with an appreciation event. Read Now
Image Public Policy The White House Should Prioritize Cybersecurity in its Budget March 8th, 2024 The White House will release its budget proposal for 2025, and it's time to create and fund initiatives that shift the advantage away from attackers. Read Now
Image Snap's Safety Efforts With AI Red Teaming From HackerOne February 27th, 2024 Together, Snap Inc. and HackerOne have made significant developments in the methodology for AI safety red teaming. Read Now
Image Hai: The AI Assistant for Vulnerability Intelligence February 27th, 2024 We have officially launched the beta version of our GenAI copilot, Hai, introducing GenAI capabilities into the HackerOne Platform. Read Now
Image The Risk of AI Voice Cloning: Q&A With an AI Hacker February 23rd, 2024 HackerOne Senior Solutions Architect and AI Hacker Dane Sherrets demonstrates how bad actors are using AI voice cloning. Read Now
Image Offensive Security Decoding the Characteristics of Modern Pentesting: Speed February 20th, 2024 HackerOne pentest experts explore the "Speed" factor of effective pentesting methods to see how each security testing alternative measures up. Read Now