Latest News & Insights

Check out the latest news and insights from HackerOne, the #1 hacker-powered security platform.

  • eBook: Executive Guide to Human Security Testing

    eBook: Executive Guide to Human Security Testing

    Read More
  • eBook: Outsmart Cybercriminals with Proactive Attack Surface Management

    eBook: Outsmart Cybercriminals with Proactive Attack Surface Management

    Read More
  • ×

    Request a Demo

    First Name
    Last Name
    Job Title
    Company
    Thank you! We'll be in touch shortly!
    Error - something went wrong!
  • The State of Vulnerability Disclosure Usage in Global Consumer IoT in 2022

    The State of Vulnerability Disclosure Usage in Global Consumer IoT in 2022

    Read More
  • 6th Annual Hacker Powered Security Report

    6th Annual Hacker Powered Security Report

    Read More
  • Explore our catalog of on-demand video content.

    View All Videos
  • Report: Seven Hacker Recon Secrets

    Report: Seven Hacker Recon Secrets

    Read More
  • Introducing HackerOne Assets

    Introducing HackerOne Assets

    This blog post is part 1 of an ongoing series that provide deep dives into HackerOne Assets and its core capabilities. Having the right automated tools to monitor your known attack surface is...

    Read Article
  • Announcing the HackerOne 2022 Attack Resistance Report: A Security Survey—How to Close Your Organization's Attack Resistance Gap

    Announcing the HackerOne 2022 Attack Resistance Report: A Security Survey—How to Close Your Organization's Attack Resistance Gap

    Today, HackerOne published The 2022 Attack Resistance Report: A HackerOne Security Survey. Our research revealed an increasing gap—the attack resistance gap—between what organizations can defend...

    Read Article
  • Corb3nik Introduces Caido

    Corb3nik Introduces Caido

    So, who is Corb3nik? My name is Ian, also known as Corb3nik on social media. I’m a long time CTF enthusiast and bug bounty hunter. Currently, I’m the co-founder for a web security toolkit called...

    Read Article
  • Corb3nik Introduces His Tool: Caido

    Corb3nik Introduces His Tool: Caido

    So, who is Corb3nik? My name is Ian, also known as Corb3nik on social media. I’m a long time CTF enthusiast and bug bounty hunter. Currently, I’m the co-founder for a web security toolkit called...

    Read Article
  • Newly Introduced HackerOne Assets Goes Beyond Attack Surface Management To Close Security Gaps

    Newly Introduced HackerOne Assets Goes Beyond Attack Surface Management To Close Security Gaps [email protected] ...

    Read Article
  • A Thank You to the Hacker Community, From HackerOne

    A Thank You to the Hacker Community, From HackerOne

    When I joined HackerOne last year, the vitality of the hacker community drew me to this organization. And as Chief Hacking Officer, I see the impact this community makes daily. Together, we’ve...

    Read Article
  • Common Vulnerability Scoring System [CVSS] | A Complete Explanation

    Common Vulnerability Scoring System [CVSS] | A Complete Explanation

    How Does CVSS Work? Vulnerabilities are flaws in an organization's internal controls, information systems, or processes that cybercriminals can exploit to steal corporate data and cause...

    Read Article
  • TikTok Celebrates Two Years of Bug Bounty

    In the last two years of their bug bounty program, the hacker community has helped TikTok identify and disclose 450 vulnerabilities in their public-facing assets. In response, TikTok has awarded...

    Read Article
  • Use Hackerone’s Enhanced Pentest as a Service to Streamline Security Testing

    Use Hackerone’s Enhanced Pentest as a Service to Streamline Security Testing

    New capabilities improve pentesting to increase attack resistance The enhanced features drive robust security testing practices with the ability to launch, test, identify, retest, and fix...

    Read Article
  • Hacker AFK: rez0

    Hacker AFK: rez0

    Today's Hacker rez0 JXoaT: What was your first experience with hacking growing up?  rez0: I think, at least for the word 'Hacking,' my experience comes from majoring in computer science. Like, I...

    Read Article
  • HackerOne Appoints Dawn Mitchell as Chief People Officer

    HackerOne Appoints Dawn Mitchell as Chief People Officer [email protected] Thu, 08/18/2022 - 09:55 Read more about HackerOne Appoints Dawn Mitchell as Chief People Officer ...

    Read Article
  • HackerOne Appoints Ilona Cohen as Chief Legal and Policy Officer

    HackerOne Appoints Ilona Cohen as Chief Legal and Policy Officer [email protected] Wed, 07/13/2022 - 03:38 Read more about HackerOne Appoints Ilona Cohen as Chief Legal and Policy...

    Read Article
  • The 2022 Attack Resistance Gap Report

    The 2022 Attack Resistance Gap Report

    Understanding where the critical flaws lie within your organization’s attack surface is critical—but complicated.

    Read More
  • App Security Testing Benchmarks—How Does Your Methodology Stack Up46:49

    App Security Testing Benchmarks—How Does Your Methodology Stack Up

    Watch Video
  • CISOs: Do You Know the Security Risks of Your Organization's Next M&A?

    CISOs: Do You Know the Security Risks of Your Organization's Next M&A?

    First, I will discuss the inherent risks associated with M&As as attack surfaces grow. A Growing and Unprotected Attack Surface An ever-expanding attack surface is a global concern for most...

    Read Article
  • loading
    Loading More...