HackerOne Blog
Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.
H1-702 Las Vegas Day 3: Switching Up Scopes
It is a new day with new challenges. Scope has shifted for the next part of our LHE. Today, you can feel the focus. These hackers have been heads...
Severe Confluence Vulnerability is an Active Threat (CVE-2022-26134)
How Critical Infrastructure Can be Protected from Threats
Accessing a major critical infrastructure network is very appealing to cybercriminals, as they can maximize...
Ethical Hackers Help Beiersdorf Minimize Risk and Protect Their Attack Surface
After a year of running a private Vulnerability Disclosure Program (VDP), Beiersdorf is announcing the launch...
What Is a Security.txt File and How Can It Help Your Program?
5 Ways I Provide Value as a PullRequest Reviewer When I Start Reviewing a New Project
Important reviewer traits for providing a great code review include prior knowledge and experience, expertise...
HackerOne Announces a New Customer Pentest Setup that's More Efficient and Speeds Time to Launch
Understanding Public and Private Bug Bounties and Vulnerability Disclosure Programs
What is Attack Resistance Management?
A Security Survey on How to Close Your Organization's Attack Resistance Gap