Skip to main content

HackerOne Blog

Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.

HackerOne Blog - Header Graphic 8
Company News, Vulnerability Management, Ethical Hacker

Introducing Program Levels: Hacker-friendly Practices that Improve Program Results

The ethical hacker community is one of the most powerful security resources available to any organization. We’ve worked with this community firsthand...

Live hacking check-in
August 4th, 2022

H1-702 Las Vegas Day 2: Hacking with Zoom

Welcome back to our first day of in-person hacking! We had some lovely people greeting you today for your...
H@cktivity
August 3rd, 2022

H1-702 Las Vegas Day 1: H@cktivitycon

After a day of prep, we were ready to launch into our first day of H1-702! What makes today special is the...
H1-702 Pyramid
August 2nd, 2022

H1-702 Las Vegas Day 0: Setup

Hackers! We have made it to Las Vegas! We are here for a live hacking event (LHE). All live hacking events are...
H1-2204 cover image
Live Hacking Events

PayPal's Third LHE Brings Top Global Hackers to the Virtual Stage

After ten years of partnering with hackers, PayPal is a leader in cybersecurity and hacker relationship...

HackerOne Blog
Penetration Testing, Vulnerability Management

Benchmark Analysis: Annual Pentest and Code Review Coverage

Security leaders often struggle to keep pace with the evolving nature of their respective attack surfaces...
Bug Bounty Programs
Vulnerability Management

5 Articles to Get You Up-to-Speed on Bug Bounty Programs

Many organizations use bug bounty programs to help them protect their ever-expanding attack surface and...

HackerOne Blog
Application Security, Vulnerability Management

Security Highlights: New CWE Rankings, Software Supply Chains, and Side-Channel Attacks

MITRE Releases 2022 CWE Top 25 The popular CWE Top 25 list, which ranks the most dangerous software...
DevSecOps Pipeline
Application Security

5 Security Stages of the DevSecOps Pipeline

DevSecOps builds on modern DevOps practices by incorporating security processes and automation into the...