The Rise of Misconfiguration and Supply Chain Vulnerabilities
Singapore-based telecom firm, Singtel, revealed last week it had suffered a security breach as a result of relying on an unpatched legacy file sharing product. The breach has compromised not only...
What Years of AWS Hacking Tells Us About Building Secure Apps
Imagine being part of an organization that has a security team that manages risks by saying “no” to change in an era of cloud migrations, remote-first work, and increased dependency on our digital...
The 4th Hacker-Powered Security Report
The 4th Annual Hacker-Powered Security Report provides the industry's most comprehensive survey of the ecosystem, including global trends, data-driven insights, and emerging technologies.
The HackerOne Top 10 Most Impactful and Rewarded Vulnerability Types
HackerOne customers have received more than 120,000 (and counting!) valid security vulnerabilities across more than 1,400 programs of all sizes. Combined, they represent a clear picture of the...