Skip to main content

HackerOne Blog

Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.

day 4 image
August 5th, 2022

H1-702 Las Vegas Day 3: Switching Up Scopes


It is a new day with new challenges. Scope has shifted for the next part of our LHE. Today, you can feel the focus. These hackers have been heads...

John Deere CISO Blog Main Image
Vulnerability Disclosure, Response, Customer Stories

Securing Digital Transformation with Vulnerability Disclosure: A Q&A with John Deere CISO, James Johnson

To help fortify security defenses for their customers, dealers, suppliers, and employees, John Deere recently...

Marten Mickos, HackerOne CEO
From The CEO, Company News

The Only Solution That Scales With the Cybersecurity Challenge

Cybersecurity is stretched thin. We all know it, so why state it again? Because cybersecurity is thinner today...
general
Customer Stories, Response, Vulnerability Disclosure

Nine Months into the DIB-VDP Pilot, Nearly 1,000 Valid Vulnerabilities Have Been Identified

With three months left in the 12-month pilot with the Department of Defense’s Defense Industrial Base...

The Global Top 10 is a valuable resource and can help organizations prioritize reported vulnerabilities.
Vulnerability Management

The HackerOne Global Top 10—Hacker Expertise, Industry Data, and Up-to-Date Vulnerabilities

Many security teams use the OWASP Top 10 as a guideline to understand where they should focus their security...
Log4J webinar with Chris Evans and Jobert Abma
Vulnerability Management, Vulnerability Disclosure

Log4Shell: Attack Evolution

HackerOne has unique visibility into the global response to Log4Shell, seeing in real time how organizations...

Learn the top five takeaways from the 2021 Hacker-Powered Security Report
Hacker Powered Security Report

Top 5 Takeaways from the 2021 Hacker-Powered Security Report: Industry Insights

For the fifth year in a row, HackerOne published a report that provides insights from the world’s largest...
HAC Common Weakness Enumeration explainted
Vulnerability Management

CWE [Common Weakness Enumeration] | Why It Is Important

Are you wondering about CWE? We explain CWE (Common Weakness Enumeration) and why this community-based...

HAC LOG4j
Vulnerability Management

Log4j Vulnerability Activity on the HackerOne Platform

This post is about the severe and widespread Log4j vulnerability. It gives a technical overview of the...