Skip to main content

HackerOne Blog

Read the HackerOne blog to learn the latest in hacker-powered security testing. Improve your security profile and follow current industry trends.

Top 5 Cloud
Application Security

The Top 5 Cloud Security Risks: How Hacker-Powered Security Can Help

Widespread digital transformation means increased cloud security risk. Learn how human intelligence—hacker-powered security—can help your organization...

Hyatt Q&A Blog
Bounty, Vulnerability Management, Customer Stories, Best Practices

Hyatt's Bug Bounty Program Update: Q&A with Senior Analyst Robert Lowery

Hyatt’s three-year-old bug bounty program has reached a significant milestone: $500,000 in bounties paid to...

One month of learning from Flo
Vulnerability Management

One Month of Learnings from Flo Health’s Bug Bounty Program: A Q&A with CISO, Leo Cunningham

The CISO of Flo Health, the world’s most popular women’s health app, knows that enabling his security team...
Vulnerability Assessments
Vulnerability Management

Vulnerability Assessment I A Complete Guide

Are you wondering about vulnerability assessments? We give a full explanation of what vulnerability...
Learn from Ransomware attacks
Vulnerability Management

What We Can Learn From Recent Ransomware Attacks 

Earlier this month, software vendor Kaseya made headlines when a vulnerability in its Virtual System...
PagerDuty with HackerOne
Vulnerability Management

How to Use HackerOne and PagerDuty to Identify When Vulnerabilities Need Action

HackerOne and PagerDuty have partnered to create a workflow automation integration that feeds critical and...
September 9th, 2021 | HACKERONE

What Are Bug Bounties? How Do They Work? [With Examples]

How Do Bug Bounties Work? Companies create bug bounties to provide financial incentives to independent bug...
Hacker API
Application Security

How the Industry’s First Hacker-Powered API Helps Hackers Automate Workflows

Today, HackerOne is launching the industry’s first hacker API. This release is now out of beta and is...
Bug Bounty vs Penetration Testing
Penetration Testing

Bug Bounty vs. Penetration Testing: Differences Explained

What is the Difference Between Bug Bounties and Penetration Testing? Organizations offer ongoing bug bounties...