Skip to main content

HackerOne Blog

Read the HackerOne blog to learn the latest in hacker-powered security testing. Improve your security profile and follow current industry trends.

The Global Top 10 is a valuable resource and can help organizations prioritize reported vulnerabilities.
Vulnerability Management

The HackerOne Global Top 10—Hacker Expertise, Industry Data, and Up-to-Date Vulnerabilities

Many security teams use the OWASP Top 10 as a guideline to understand where they should focus their security strategies and cyberattack prevention...

The Global Top 10 is a valuable resource and can help organizations prioritize reported vulnerabilities.
Vulnerability Management

The HackerOne Global Top 10—Hacker Expertise, Industry Data, and Up-to-Date Vulnerabilities

Many security teams use the OWASP Top 10 as a guideline to understand where they should focus their security...
Log4J webinar with Chris Evans and Jobert Abma
Vulnerability Management, Vulnerability Disclosure

Log4Shell: Attack Evolution

HackerOne has unique visibility into the global response to Log4Shell, seeing in real time how organizations...

Learn the top five takeaways from the 2021 Hacker-Powered Security Report
Hacker Powered Security Report

Top 5 Takeaways from the 2021 Hacker-Powered Security Report: Industry Insights

For the fifth year in a row, HackerOne published a report that provides insights from the world’s largest...
HAC Common Weakness Enumeration explainted
Vulnerability Management

CWE [Common Weakness Enumeration] | Why It Is Important

Are you wondering about CWE? We explain CWE (Common Weakness Enumeration) and why this community-based...

HAC LOG4j
Vulnerability Management

Log4j Vulnerability Activity on the HackerOne Platform

This post is about the severe and widespread Log4j vulnerability. It gives a technical overview of the...

HAC CVSS
Vulnerability Management

Common Vulnerability Scoring System [CVSS] | A Complete Explanation

Were you wondering about the Common Vulnerability Scoring System (CVSS)? We explain what CVSS is, why it is...

HAC Help Orgs
Security At Event, Vulnerability Management

How Hackers Help Organizations Face New Attack Vectors and Build Stronger Security Programs

The risk of cyberattacks grows every day. But there is an essential defensive step that organizations can take...

complete guide
Vulnerability Management

Vulnerability Management | A Complete Guide and Best Practices

We explain what vulnerability management is and why it matters, and we give a step-by-step guide to...