Skip to main content

Vulnerability Management

We cover everything in vulnerability management including discovery, prioritization, assessment, disclosure, and remediation.

HackerOne Blog
Vulnerability Management

HackerOne’s In-Depth Approach to Vulnerability Triage and Validation

Like triaging in a hospital emergency room, security issues must be diagnosed and handled by an expert as soon as they arrive. But it doesn’t stop...

HackerOne Attack Resistance Report reveals the increasing attack resistance gap many organizations are facing
Company News, Vulnerability Management

Announcing the HackerOne 2022 Attack Resistance Report: A Security Survey—How to Close Your Organization's Attack Resistance Gap

Today, HackerOne published The 2022 Attack Resistance Report: A HackerOne Security Survey. Our research...

The Global Top 10 is a valuable resource and can help organizations prioritize reported vulnerabilities.
Vulnerability Management

The HackerOne Global Top 10—Hacker Expertise, Industry Data, and Up-to-Date Vulnerabilities

Many security teams use the OWASP Top 10 as a guideline to understand where they should focus their security...
Log4J webinar with Chris Evans and Jobert Abma
Vulnerability Management, Vulnerability Disclosure

Log4Shell: Attack Evolution

HackerOne has unique visibility into the global response to Log4Shell, seeing in real time how organizations...

HAC Common Weakness Enumeration explainted
Vulnerability Management

CWE [Common Weakness Enumeration] | Why It Is Important

Are you wondering about CWE? We explain CWE (Common Weakness Enumeration) and why this community-based...

HAC LOG4j
Vulnerability Management

Log4j Vulnerability Activity on the HackerOne Platform

This post is about the severe and widespread Log4j vulnerability. It gives a technical overview of the...

HAC CVSS
Vulnerability Management

Common Vulnerability Scoring System [CVSS] | A Complete Explanation

Were you wondering about the Common Vulnerability Scoring System (CVSS)? We explain what CVSS is, why it is...

hac blog
Security At Event, Vulnerability Management

How Hackers Help Organizations Face New Attack Vectors and Build Stronger Security Programs

The risk of cyberattacks grows every day. But there is an essential defensive step that organizations can take...

complete guide
Vulnerability Management

Vulnerability Management | A Complete Guide and Best Practices

We explain what vulnerability management is and why it matters, and we give a step-by-step guide to...