Skip to main content

Vulnerability Management

We cover everything in vulnerability management including discovery, prioritization, assessment, disclosure, and remediation.

The Global Top 10 is a valuable resource and can help organizations prioritize reported vulnerabilities.
Vulnerability Management

The HackerOne Global Top 10—Hacker Expertise, Industry Data, and Up-to-Date Vulnerabilities

Many security teams use the OWASP Top 10 as a guideline to understand where they should focus their security strategies and cyberattack prevention...

The Global Top 10 is a valuable resource and can help organizations prioritize reported vulnerabilities.
Vulnerability Management

The HackerOne Global Top 10—Hacker Expertise, Industry Data, and Up-to-Date Vulnerabilities

Many security teams use the OWASP Top 10 as a guideline to understand where they should focus their security...
Log4J webinar with Chris Evans and Jobert Abma
Vulnerability Management, Vulnerability Disclosure

Log4Shell: Attack Evolution

HackerOne has unique visibility into the global response to Log4Shell, seeing in real time how organizations...

HAC Common Weakness Enumeration explainted
Vulnerability Management

CWE [Common Weakness Enumeration] | Why It Is Important

Are you wondering about CWE? We explain CWE (Common Weakness Enumeration) and why this community-based...

HAC LOG4j
Vulnerability Management

Log4j Vulnerability Activity on the HackerOne Platform

This post is about the severe and widespread Log4j vulnerability. It gives a technical overview of the...

HAC CVSS
Vulnerability Management

Common Vulnerability Scoring System [CVSS] | A Complete Explanation

Were you wondering about the Common Vulnerability Scoring System (CVSS)? We explain what CVSS is, why it is...

HAC Help Orgs
Security At Event, Vulnerability Management

How Hackers Help Organizations Face New Attack Vectors and Build Stronger Security Programs

The risk of cyberattacks grows every day. But there is an essential defensive step that organizations can take...

complete guide
Vulnerability Management

Vulnerability Management | A Complete Guide and Best Practices

We explain what vulnerability management is and why it matters, and we give a step-by-step guide to...

secure supply chain
Vulnerability Management

 Securing the Supply Chain by Working With Ethical Hackers

Software supply chain attacks increasingly create concern among cybersecurity experts as these exploits are...