Skip to main content

HackerOne Blog

Read the HackerOne blog to learn the latest in hacker-powered security testing. Improve your security profile and follow current industry trends.

Top 5 Cloud
Application Security

The Top 5 Cloud Security Risks: How Hacker-Powered Security Can Help

Widespread digital transformation means increased cloud security risk. Learn how human intelligence—hacker-powered security—can help your organization...

Pentest screenshot
Penetration Testing, New Features

HackerOne Rolls Out Pentest Review System for Customers and Pentesters

Traditional pentesting suffers from a persistent issue: a lack of transparency into the pentest process itself...
Are Election Hacking Fears Driving Voters To The Polls?
Company News, Data and Analysis

Are Election Hacking Fears Driving Voters To The Polls?

If people fear that the American electoral infrastructure could be hacked, will they withhold their votes in...

Image of community event
Company News, Hacker Resources, Hacker 101

Become a HackerOne Brand Ambassador

Announcing the Hacker Brand Ambassador Program: lead hackers in your city, get exclusive perks, further your...

Students learning to hack
Ethical Hacker, Challenge, Customer Stories

National University of Singapore Taps Students to Hack for Good

In an inaugural InterUni Bug Bounty Challenge jointly organized by the National University of Singapore (NUS)...

Picture of hacktivitycon
Ethical Hacker, Events, Hacker Resources, Hacker 101

Recap of h@cktivitycon 2020

HackerOne’s first-ever hacker conference, h@cktivitycon streamed from Twitch on Friday, July 31st - August 1st...

Congratulations on 5 years!
Company News, Customer Stories, Bounty, Response

Adobe and HackerOne Celebrate Five Years of Continued Collaboration

To celebrate five years with HackerOne, we sat down with Adobe’s Senior Security Program Manager Pieter Ockers...

COVID Infographic - Global Impact
Company News, News, Hacker Powered Security Report

COVID Confessions of a CISO

The COVID-19 crisis has shifted life online. As companies rush to meet remote work requirements and customer...

Ethical Hacker

Human vs. Machine: Three-Part Virtual Series on the Human Element of AppSec

In 2011, when IBM’s Watson supercomputer went up against ‘Jeopardy’ icon Ken Jennings, the world watched as a...