HackerOne
The HackerOne Blog
-
Hack My Career: Meet Bertijn Eldering
Bertijn’s story is a great example of how passion, curiosity, and determination can open doors. From navigating the challenges of an internship to landing a full-time position, let’s dive into...
-
Re-live the Security@ magic in our on-demand video library!
Take me there! -
Takeaways from the Dismissal of the Government’s Case Against the SolarWinds CISO
The case against SolarWinds was filed by the Securities and Exchange Commission (SEC), a government agency that has interpreted its authority broadly to regulate publicly traded companies. The...
-
5 Questions to Assess Your Organization’s Bug Bounty Readiness
1. Are You Prepared to Manage Incoming Vulnerability Reports?Naturally, the purpose of running a bug bounty program is to identify vulnerabilities beyond what your security team can find — and...
-
Hack My Career: Meet Alek Relyea
Alek is a perfect example of persistence and adaptability, even without a traditional tech background, which can lead to success in the tech industry. In this blog, Alek shares his story and...
-
How Hai’s Report Summarization Turns Complex Data Into Actionable Insights
Enter HackerOne's AI Co-Pilot, Hai, a revolutionary tool designed to streamline this process and enhance understanding across the board.Hai is transforming how security teams handle and interpret...
-
Anthropic Expands Their Model Safety Bug Bounty Program
Expanding Our Model Safety Bug Bounty Program The rapid progression of AI model capabilities demands an equally swift advancement in safety protocols. As we work on developing the next generation...
-
Tips for Parents Working from Home from HackerOne Employees
At HackerOne, we've witnessed our parents craft impressive solutions to blend their professional and personal worlds. We wanted to hear from our HackerOne parents and how they stay productive...
-
Security Page Updates: Boosting Consistency & Transparency for Security Researchers and Customers
Cross-Directional Consistency & Transparency on the HackerOne PlatformHackerOne is a marketplace through which organizations can address security vulnerabilities with security researchers, and...
-
Introducing HackerOne Gateway Internal Network Testing: Superior Security for Internal Networks
Our Solution: Precision Internal Network Testing with Zero Trust ControlWe are excited to introduce Gateway Internal Network Testing (INT) as the latest enhancement to HackerOne Gateway, powered...
-
How a GraphQL Bug Resulted in Authentication Bypass
What Is an Authentication Bypass Vulnerability?An authentication bypass vulnerability is a weakness in a system that fails to protect against unauthenticated access, allowing an attacker to bypass...
-
Lessons from HackerOne’s First Recharge Week
Our first-ever Recharge Week – July 1–5, 2024—aimed at giving most company employees a simultaneous week off to rest, pursue hobbies, and spend time with loved ones, free from the demands of work...
-
Are You Ready for the New NIST Control Around Public Disclosure Programs?
Let’s first define what we’re talking about when we refer to these NIST controls. NIST 800-53 is a popular framework for security programs globally and also acts as the baseline control set for...
-
HIPAA and Pentesting: What You Need to Know
HIPAA regulatory standards outline the lawful use, disclosure, and safeguarding of protected health information (PHI). Any organization that collects or handles PHI must comply with HIPAA rules....
-
Hack My Career: Meet Naz Bozdemir
We talked to Naz Bozdemir, Product Marketing Lead, about her unique path and asked her to share insights into her career.From International Relations to CybersecurityNaz’s adventure started with a...
-
Streamline Report Management with Custom Inboxes: Reducing Delays and Security Risks
Introducing Custom InboxesCustom Inboxes provide our enterprise customers with unparalleled flexibility in report management. Now, organizational administrators can create, remove, and edit up to...
-
How HackerOne Organizes a Remote Hack Week
This year's Hack Week was dedicated to artificial intelligence (AI), and teams worked together to problem-solve and explore new projects, keeping this theme in mind.A dedicated hack week or hack...
-
10 Years of the GitHub Security Bug Bounty Program
Each year, we celebrate the GitHub Security Bug Bounty program, highlighting impressive bugs and researchers, rewards, live hacking events, and more. This year, we celebrate a new milestone: 10...
-
Feedback-Driven Interviewing at HackerOne
The Talent Acquisition team currently has a net promoter score (NPS) of 56%, while the industry standard is 50%. However, we can improve and refine our hiring practices to attract and retain the...
-
What HackerOne Customers Say About the Problems Hackers Solve
The Problems Customers Use Ethical Hackers To SolveOrganizations work with ethical hackers to address a range of issues, including knowing unknowns, preventing breaches, meeting regulatory...
-
Pentesting for Web Applications
Pentest reports are a requirement for many security compliance certifications (such as ISO 27001 and SOC 2), and having regular pentest reports on hand can also signal to high-value customers that...
- Loading More...