HackerOne Team

  • How to Use HackerOne and PagerDuty to Identify When Vulnerabilities Need Action

    How to Use HackerOne and PagerDuty to Identify When Vulnerabilities Need Action

    HackerOne and PagerDuty have partnered to create a workflow automation integration that feeds critical and high severity vulnerability findings into PagerDuty alerts to notify security teams and...

    Read Article
  • What Are Bug Bounties? How Do They Work? [With Examples]

    What Are Bug Bounties? How Do They Work? [With Examples]

    Are you looking for examples of bug bounties? We’ll explain what bug bounties are and show you how they work step-by-step using actual examples. How Do Bug Bounties Work? Companies create bug...

    Read Article
  • How the Industry’s First Hacker-Powered API Helps Hackers Automate Workflows

    How the Industry’s First Hacker-Powered API Helps Hackers Automate Workflows

    Today, HackerOne is launching the industry’s first hacker API. This release is now out of beta and is available to the hacker community. It includes a collection of API endpoints that help...

    Read Article
  • How HackerOne Positively Influences Zebra’s Software Development Life Cycle

    How HackerOne Positively Influences Zebra’s Software Development Life Cycle

    Dr. Jasyn Voshell, Director for Product and Solution Security at Zebra Technologies, is a power user of HackerOne, with a Vulnerability Disclosure Program (VDP), bug bounty program, and his team...

    Read Article
  • Bug Bounty vs. CTF [Understanding Differences & Benefits]

    Bug Bounty vs. CTF [Understanding Differences & Benefits]

    What Are the Differences Between a Bug Bounty and CTF? A bug bounty is a financial reward a company offers to ethical hackers for discovering vulnerabilities. A Capture the Flag, or CTF, is a...

    Read Article
  • Bug Bounty vs. Penetration Testing: 	Differences Explained

    Bug Bounty vs. Penetration Testing: Differences Explained

    What Is the Difference Between Bug Bounties and Penetration Testing? Companies offer ongoing bug bounties to freelance ethical hackers to discover security vulnerabilities. Alternatively,...

    Read Article
  • Rightsline Pentest Case Study

    Rightsline Pentest Case Study

    Rightsline is trusted to guard the entertainment industry’s intellectual property. See how they leverage HackerOne to demonstrate their commitment to security and stay proactive against threats.

    Read More
  • Top 5 Common Security Assessment Mistakes and How to Avoid Them

    Top 5 Common Security Assessment Mistakes and How to Avoid Them

    Security assessments play an important role in helping organizations determine their cybersecurity readiness and learn about security gaps that should top their priorities list. Learn the top five mos

    Read More
  • HackerOne in DevSecOps 

    HackerOne in DevSecOps 

    Hundreds of HackerOne customers use our platform in their application security processes. For the most part, these are organizations using bug bounty to find vulnerabilities in their deployed...

    Read Article
  • What is Vulnerability Scanning? [And How to Do It Right]

    What is Vulnerability Scanning? [And How to Do It Right]

    Wondering what vulnerability scanning is? We will explain how it works, why you need to do it, and how to do it right. What is Vulnerability Scanning? Vulnerability scanning uses an application...

    Read Article
  • How HackerOne and GitHub Now Work Better Together

    How HackerOne and GitHub Now Work Better Together

    Developers need to bring security into their workflows without pivoting to separate security tools to get vulnerability information. HackerOne has created an integration with GitHub to streamline...

    Read Article
  • Citrix’s Hacker-Powered Security Growth Plan: Q&A with Abhijith Chandrashekar

    Citrix’s Hacker-Powered Security Growth Plan: Q&A with Abhijith Chandrashekar

    With over 400,000 customers, Citrix is a recognized industry leader in both digital workspace technology and in its approach to hacker-powered security. Spearheaded by Abhijith Chandrashekar,...

    Read Article
  • How Hackers Can Help Reduce Your Organization's Application Risk on AWS 

    HackerOne recently hosted AWS and a panel of expert ethical hackers to discuss how Server-Side Request Forgery (SSRF) vulnerabilities and cloud misconfiguration are ripe environments for hackers...

    Read Article
  • What is Penetration Testing? How Does It Work Step-by-Step?

    What is Penetration Testing? How Does It Work Step-by-Step?

    Are you wondering about penetration testing? We give a full explanation of what pentesting is, what the benefits are, and how to implement it. What is Penetration Testing? Penetration testing,...

    Read Article
  • 60 days of insights from the DoD’s Defense Industrial Base Vulnerability Disclosure Program Pilot

    60 days of insights from the DoD’s Defense Industrial Base Vulnerability Disclosure Program Pilot

    In April of 2021, the Defense Industrial Base Vulnerability Disclosure Program (DIB-VDP) pilot kicked off a twelve-month program to invite security researchers to hunt for vulnerabilities in DIB...

    Read Article
  • Announcing Hack the Army 3.0 Results: A Conversation with Defense Digital Service, U.S. Army, and Hack the Army 3.0’s Top Hacker

    Announcing Hack the Army 3.0 Results: A Conversation with Defense Digital Service, U.S. Army, and Hack the Army 3.0’s Top Hacker

    Five years after the Defense Digital Service (DDS) launched the first-ever U.S. federal government bug bounty Challenge, we’re pleased to announce the results of Hack the Army 3.0, the third...

    Read Article
  • Build a Resilient Security Posture with Vulnerability Intelligence and Cybersecurity Ratings

    Build a Resilient Security Posture with Vulnerability Intelligence and Cybersecurity Ratings

    Reducing risk is the fundamental reason organizations invest in cybersecurity. The threat landscape grows and evolves, creating the need for a proactive, continual approach to building and...

    Read Article
  • Hack Hard. Have Fun. Increase Security

    Hack Hard. Have Fun. Increase Security

    Amazon's Live Hacking Event with HackerOne At Amazon, ensuring security is essential for earning customers’ trust. As part of Amazon’s ongoing public Vulnerability Research Program (VRP), Amazon...

    Read Article
  • How Digital Transformation Changes An Organization's Security Challenges

    How Digital Transformation Changes An Organization's Security Challenges

    Last week, HackerOne joined WhiteSource, AWS, and IGT for a roundtable discussion about the new security challenges of digital transformation. Both existing organizations making the digital shift...

    Read Article
  • Microsoft Says: Russian SolarWinds Hackers Hit U.S. Government Agencies Again

    Microsoft Says: Russian SolarWinds Hackers Hit U.S. Government Agencies Again

    According to the New York Times, Microsoft says the state-backed Russian hacker group Nobelium—the same actor behind the 2020 SolarWinds attacks—took control of the State Department’s United...

    Read Article
  • loading
    Loading More...