Skip to main content

Security@ 2022: Achieve Attack Resistance

Get your complimentary pass to Security@ 2022 with promo code VIPCOMP

October 12-13, San Diego | October 13, London

Register today


HackerOne Blog

Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.

Application Security, Penetration Testing, Vulnerability Management

Introducing Unified HackerOne Scope Management with Burp Suite Support

This post will start with the basics of defining scope and how ethical hackers and testers use it in their testing workflow. If you’re already...

HackerOne Blog
Best Practices

Preventing Compromised Password Reuse on

This week, we rolled out an improvement to account security on the HackerOne website. We now block the use of...
Gitlab March 2022 blog header
Bounty, Best Practices, Customer Stories

Shifting Left with Ethical Hackers: A Q&A with GitLab

Secure applications start with secure code. As organizations deploy code faster than ever, implementing...

The HackerOne Hack for Good initiative supports humanitarian relief in Ukraine
March 3rd, 2022

Donating Bounties to Humanitarian Efforts in Ukraine

In 2020, we launched the Hack for Good program to allow ethical hackers to donate their bounties to charitable...
John Deere CISO Blog Main Image
Vulnerability Disclosure, Response, Customer Stories

Securing Digital Transformation with Vulnerability Disclosure: A Q&A with John Deere CISO, James Johnson

To help fortify security defenses for their customers, dealers, suppliers, and employees, John Deere recently...

Marten Mickos, HackerOne CEO
From The CEO, Company News

The Only Solution That Scales With the Cybersecurity Challenge

Cybersecurity is stretched thin. We all know it, so why state it again? Because cybersecurity is thinner today...
Customer Stories, Response, Vulnerability Disclosure

Nine Months into the DIB-VDP Pilot, Nearly 1,000 Valid Vulnerabilities Have Been Identified

With three months left in the 12-month pilot with the Department of Defense’s Defense Industrial Base...

The Global Top 10 is a valuable resource and can help organizations prioritize reported vulnerabilities.
Vulnerability Management

The HackerOne Global Top 10—Hacker Expertise, Industry Data, and Up-to-Date Vulnerabilities

Many security teams use the OWASP Top 10 as a guideline to understand where they should focus their security...
Log4J webinar with Chris Evans and Jobert Abma
Vulnerability Management, Vulnerability Disclosure

Log4Shell: Attack Evolution

HackerOne has unique visibility into the global response to Log4Shell, seeing in real time how organizations...