Latest News & Insights

Check out the latest news and insights from HackerOne, the #1 hacker-powered security platform.

  • The Hacker-Powered Security Report 2019

    The Hacker-Powered Security Report 2019

    Read More
  • How Bug Bounties Help You Shift Left

    How Bug Bounties Help You Shift Left

    For many organizations, the days when security acted as a final “check-in” are disappearing faster than the guacamole at a Super Bowl party. Nowadays, cloud, agile, DevOps, and CI/CD pipelines...

    Read Article
  • HackerOne is a 2019 Cyber Catalyst Designated Cybersecurity Solution

    HackerOne is a 2019 Cyber Catalyst Designated Cybersecurity Solution

    HackerOne has been chosen as a 2019 Cyber CatalystSM designated cybersecurity solution. HackerOne Bounty was selected by Cyber Catalyst insurers as a solution that can have a meaningful impact on...

    Read Article
  • 8 High-impact Bugs and How HackerOne Customers Avoided a Breach: SQL Injection

    8 High-impact Bugs and How HackerOne Customers Avoided a Breach: SQL Injection

    This blog series counts down 8 high-impact vulnerability types, along with examples of how HackerOne helped avoid breaches associated with them. This blog, the third in the series, looks at SQL...

    Read Article
  • LINE Launches Public Bug Bounty Program: Q&A with Security Engineer Robin Lunde

    LINE Launches Public Bug Bounty Program: Q&A with Security Engineer Robin Lunde

    LINE Corporation is one of the most popular messaging applications in Asia Pacific, serving millions of users in countries including Japan, Thailand, Indonesia, Taiwan, and India to name a few....

    Read Article
  • Supporting the Source: Why HackerOne is Upgrading its Free Tools for Open Source

    Supporting the Source: Why HackerOne is Upgrading its Free Tools for Open Source

    Protecting open source is our social responsibility and essential to internet well being. We believe this is important and essential. Open source software powers HackerOne. It powers our...

    Read Article
  • ×

    Request a Demo

    Thank you!
    Error - something went wrong!
  • 8 High-Impact Bugs and How HackerOne Customers Avoided a Breach: Information Disclosure

    8 High-Impact Bugs and How HackerOne Customers Avoided a Breach: Information Disclosure

    This blog series counts down 8 high-impact vulnerability types, along with examples of how HackerOne helped avoid breaches associated with them. This is the second in the series after we kicked...

    Read Article
  • Keynote with Phil Venables of Goldman Sachs

    Keynote with Phil Venables of Goldman Sachs

    Phil Venables, senior advisor and board director at Goldman Sachs, has seen more than his share of highs and lows in the security world. The former Goldman Sachs CISO has held senior-level...

    Read Article
  • Q&A with HackerOne's New Vice President, APAC, Attley Ng

    Q&A with HackerOne's New Vice President, APAC, Attley Ng

    Fueled by tremendous demand for hacker-powered security in the region, security veteran Attley Ng has joined HackerOne as Vice President of Asia Pacific, based in our Singapore office. Public and...

    Read Article
  • Lowering Your Pentesting Fees with HackerOne

    Lowering Your Pentesting Fees with HackerOne

    Each blog in the series "Breaking Down the Benefits of Hacker-Powered Pentests"  has focused on one of the key findings in Forrester Consulting’s report The Total Economic Impact Of HackerOne...

    Read Article
  • Slack Increases Minimum Bounties for High and Critical Bugs for 30 Days

    Slack Increases Minimum Bounties for High and Critical Bugs for 30 Days

    This blog post was contributed by Slack Staff Technical Program Manager Branden Jordan. Over the past five years, Slack and HackerOne have established a partnership and commitment to ensure...

    Read Article
  • Why Hacker-Powered Security is the Answer to Every Security Questionnaire

    Why Hacker-Powered Security is the Answer to Every Security Questionnaire

    Every company targeting mid-size or larger companies is bound to experience the joys of the formal security questionnaire. It can range from a simple bulleted list of questions to multiple...

    Read Article
  • Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne

    Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne

    Vulnerabilities are a fact of life; risk comes with it. Today, companies, enterprises, and governments are embracing collaboration with hackers to find vulnerabilities before criminals have a...

    Read Article
  • The HackerOne Top 10 Most Impactful and Rewarded Vulnerability Types

    The HackerOne Top 10 Most Impactful and Rewarded Vulnerability Types

    HackerOne customers have received more than 120,000 (and counting!) valid security vulnerabilities across more than 1,400 programs of all sizes. Combined, they represent a clear picture of the...

    Read Article
  • The 2019 Hacker Report: Celebrating The World’s Largest Community of Hackers

    The 2019 Hacker Report: Celebrating The World’s Largest Community of Hackers

    Hackers are heroes, they are in it for the good and there is more opportunity than ever before. The community of over 300,000 hackers on HackerOne represents a global force for good, coming...

    Read Article
  • @try_to_hack Makes History as First Bug Bounty Hacker to Earn over $1 Million

    @try_to_hack Makes History as First Bug Bounty Hacker to Earn over $1 Million

    19-year-old Argentinian @try_to_hack just made history as the first to earn over $1,000,000 in bounty awards on HackerOne. Since joining HackerOne in 2015, Santiago has reported over 1,670 valid...

    Read Article
  • Your First 90 Days as Security Lead, Part 2: Developing a Plan and Getting to Work

    Your First 90 Days as Security Lead, Part 2: Developing a Plan and Getting to Work

    You’ve just been named as your organization’s new head of security. So what do you do first? Read part one of this series, “Building Your Security Foundation”, then come back here to continue. At...

    Read Article
  • loading
    Loading More...