HackerOne Blog
Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.
Get the latest news and insights beamed directly to you.
Gain Actionable, Data-backed Insights with HackerOne Recommendations
Discover more with topics that matter to you most.
AI
Generative Artificial Intelligence (GenAI) is ushering in a new era of how humans leverage technology. At HackerOne, we are combining human intelligence with artificial intelligence at scale to improve the efficiency of people and unlock entirely new capabilities.
Application Security
Learn how to prevent vulnerabilities in your applications. We cover current practices in application security, cloud security, API testing, and more.
Penetration Testing
Follow the latest practices in penetration testing, including API testing, application testing, external networks, internet-facing infrastructure, and more.
Public Policy
HackerOne advocates for policies and standards around the world that support our customers, advance protections for the hacker community, and promote adoption of cybersecurity best practices.
Vulnerability Management
We cover everything in vulnerability management including discovery, prioritization, assessment, disclosure, and remediation.
Engineering Blog
Inside HackerOne Engineering: developing for a safer digital world.

CISOs and GDPR: The Top 3 Concerns

Hacker Q&A with Rachel Tobac: Hacking Companies Through Their People

Introducing The 90 day Hacker Leaderboard and Revamped Invitations

Hacker Q&A with Alyssa: We are all still learning

Hursti hacks, DEF CON villages, and the Dubious state of electronic voting
The 8th Annual Hacker-Powered Security Report


H1-415 Recap: Oath Pays Over $400,000 to Hackers in One Day

H1-202 Recap: Mapbox Pays Out Nearly $65,000 in One Day
