Skip to main content

HackerOne Blog

Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.

DevOps DevSecOps
Application Security

DevSecOps vs DevOps: What is the Difference?

DevSecOps can dramatically reduce cyber risk for organizations—particularly those that rely on internal development for a competitive advantage.

HackerOne Blog
Vulnerability Management

HackerOne’s In-Depth Approach to Vulnerability Triage and Validation

Like triaging in a hospital emergency room, security issues must be diagnosed and handled by an expert as soon...
DevOps DevSecOps
Application Security

DevSecOps vs DevOps: What is the Difference?

DevSecOps can dramatically reduce cyber risk for organizations—particularly those that rely on internal...

How Bug Bounty Uncovered A 5-Year-Old Vulnerability In Hours
Ethical Hacker, Vulnerability Management

How Bug Bounty Uncovered A 5-Year-Old Vulnerability In Hours

When PullRequest was acquired, these concerns became HackerOne’s challenges. When we finalized the acquisition...
h1-303 Poster
HackerOne Community Blog

Live Hacking Event Invitations - 2022 Guide

Hello Hackers, Live Hacking Events are an experience like no other: hackers collaborate and connect with...
CISOs: Do You Know M&A Security Risks?
Vulnerability Management

CISOs: Do You Know the Security Risks of Your Organization's Next M&A?

An ever-expanding attack surface is a global concern for most organizations and complicates an M&A, especially...

HackerOne Community
June 9th, 2022

H1 Community Team: Your Hacker Allies

Jessica Sexton, Director of Community (Twitter/LinkedIn) "I am excited to build a team and strategic programs...
H1-303
June 13th, 2022

Community at HackerOne: What's to Come

From Jessica Sexton - Director of Community, Three years ago, I found my home at HackerOne. My primary focus...
Common Security Issues
June 10th, 2022

The Top 5 Most Common Security Issues I Discover When Reviewing Code

NOTE: The following code examples have been contrived to provide detailed, illustrative representations of...