Latest News & Insights

The latest from HackerOne, the #1 hacker-powered security platform.

  • The 2021 Hacker Report

    The 2021 Hacker Report

    Read More
  • 5 Ways CISOs Derive Value From Hacker-Powered Security

    5 Ways CISOs Derive Value From Hacker-Powered Security

    Read More
  • HackerOne's Top 10 Most Impactful Vulnerabilities

    See the Top 10
  • HackerOne Joins AWS Marketplace as Cloud Vulnerabilities Rise

    HackerOne Joins AWS Marketplace as Cloud Vulnerabilities Rise

    Addressing security risks at scale is more important than ever. With a global pandemic accelerating digital transformations, organizations are shipping new products and services at a faster clip,...

    Read Article
  • ×

    Request a Demo

    First Name
    Last Name
    Company
    Thank you!
    Error - something went wrong!
  • CISA BOD 20-01 Checklist: Vulnerability Disclosure

    CISA BOD 20-01 Checklist: Vulnerability Disclosure

    Read More
  • ×

    Get your personalized hacker comic!

    First Name
    Last Name
    Company
    Please check your inbox!
    Error - something went wrong!
  • NIST 800-53B Checklist: Public Disclosure

    NIST 800-53B Checklist: Public Disclosure

    Read More
  • Get strategies from advanced security teams today.

    See All Videos
  • The 4th Hacker-Powered Security Report

    The 4th Hacker-Powered Security Report

    The 4th Annual Hacker-Powered Security Report provides the industry's most comprehensive survey of the ecosystem, including global trends, data-driven insights, and emerging technologies.

    Read More
  • Security Leaders Handbook

    Security Leaders Handbook

    A guide for making meaningful progress on improving your security posture

    Read More
  • HackerOne is a 2019 Cyber Catalyst Designated Cybersecurity Solution

    HackerOne is a 2019 Cyber Catalyst Designated Cybersecurity Solution

    HackerOne has been chosen as a 2019 Cyber CatalystSM designated cybersecurity solution. HackerOne Bounty was selected by Cyber Catalyst insurers as a solution that can have a meaningful impact on...

    Read Article
  • 8 High-impact Bugs and How HackerOne Customers Avoided a Breach: SQL Injection

    8 High-impact Bugs and How HackerOne Customers Avoided a Breach: SQL Injection

    This blog series counts down 8 high-impact vulnerability types, along with examples of how HackerOne helped avoid breaches associated with them. This blog, the third in the series, looks at SQL...

    Read Article
  • LINE Launches Public Bug Bounty Program: Q&A with Security Engineer Robin Lunde

    LINE Launches Public Bug Bounty Program: Q&A with Security Engineer Robin Lunde

    LINE Corporation is one of the most popular messaging applications in Asia Pacific, serving millions of users in countries including Japan, Thailand, Indonesia, Taiwan, and India to name a few....

    Read Article
  • Supporting the Source: Why HackerOne is Upgrading its Free Tools for Open Source

    Supporting the Source: Why HackerOne is Upgrading its Free Tools for Open Source

    Protecting open source is our social responsibility and essential to internet well being. We believe this is important and essential. Open source software powers HackerOne. It powers our...

    Read Article
  • 8 High-Impact Bugs and How HackerOne Customers Avoided a Breach: Information Disclosure

    8 High-Impact Bugs and How HackerOne Customers Avoided a Breach: Information Disclosure

    This blog series counts down 8 high-impact vulnerability types, along with examples of how HackerOne helped avoid breaches associated with them. This is the second in the series after we kicked...

    Read Article
  • Keynote with Phil Venables of Goldman Sachs

    Keynote with Phil Venables of Goldman Sachs

    Phil Venables, senior advisor and board director at Goldman Sachs, has seen more than his share of highs and lows in the security world. The former Goldman Sachs CISO has held senior-level...

    Read Article
  • Slack Increases Minimum Bounties for High and Critical Bugs for 30 Days

    Slack Increases Minimum Bounties for High and Critical Bugs for 30 Days

    This blog post was contributed by Slack Staff Technical Program Manager Branden Jordan. Over the past five years, Slack and HackerOne have established a partnership and commitment to ensure...

    Read Article
  • Why Hacker-Powered Security is the Answer to Every Security Questionnaire

    Why Hacker-Powered Security is the Answer to Every Security Questionnaire

    Every company targeting mid-size or larger companies is bound to experience the joys of the formal security questionnaire. It can range from a simple bulleted list of questions to multiple...

    Read Article
  • Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne

    Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne

    Vulnerabilities are a fact of life; risk comes with it. Today, companies, enterprises, and governments are embracing collaboration with hackers to find vulnerabilities before criminals have a...

    Read Article
  • The 2019 Hacker Report: Celebrating The World’s Largest Community of Hackers

    The 2019 Hacker Report: Celebrating The World’s Largest Community of Hackers

    Hackers are heroes, they are in it for the good and there is more opportunity than ever before. The community of over 300,000 hackers on HackerOne represents a global force for good, coming...

    Read Article
  • Your First 90 Days as Security Lead, Part 2: Developing a Plan and Getting to Work

    Your First 90 Days as Security Lead, Part 2: Developing a Plan and Getting to Work

    You’ve just been named as your organization’s new head of security. So what do you do first? Read part one of this series, “Building Your Security Foundation”, then come back here to continue. At...

    Read Article
  • Rethink Your Traditional Pentests

    Rethink Your Traditional Pentests

    Understand the challenges customers experience from traditional pentesting and why they fall short.

    Read More
  • Meet the Hackers who #HackForGood 55:36

    Meet the Hackers who #HackForGood

    Watch Video
  • loading
    Loading More...