HackerOne

The HackerOne Blog

  • Vulnerability Deep Dive: Gaining RCE Through ImageMagick With Frans Rosen

    Vulnerability Deep Dive: Gaining RCE Through ImageMagick With Frans Rosen

    The file upload vulnerability type is as broad in scope as the number of different file types. These vulnerabilities are an ever-present security concern. While the underlying mechanics of how the...

    Read Article
  • Re-live the Security@ magic in our on-demand video library!

    Take me there!
  • How To Use HackerOne’s Global Vulnerability Policy Map

    How To Use HackerOne’s Global Vulnerability Policy Map

    To help organizations keep up with the shifting landscape of VDP mandates and recommendations, HackerOne has developed the Global Vulnerability Policy Map, an interactive map-based tracker. Users...

    Read Article
  • European Council Adopts Cyber Resilience Act

    European Council Adopts Cyber Resilience Act

    The CRA will be a game-changing regulation for software and connected product security. The CRA imposes cybersecurity requirements for manufacturers of software and connected products sold in the...

    Read Article
  • Measure Your AI Risk Preparedness with This Interactive Self-Assessment Tool

    Measure Your AI Risk Preparedness with This Interactive Self-Assessment Tool

    Effectively managing these risks requires human expertise and strategic oversight. That’s where the AI Risk Readiness Self-Assessment Tool comes in — helping your organization evaluate the...

    Read Article
  • The Recruitment Process: What to Expect When You Apply at HackerOne

    The Recruitment Process: What to Expect When You Apply at HackerOne

    If you’re considering applying, here’s a look at what you can expect from the process, from the initial application to joining your onboarding cohort.Application Review Once you submit your...

    Read Article
  • Pentesting for Internal Networks

    Pentesting for Internal Networks

    Testing MethodologiesHackerOne's testing methodologies are grounded in the principles of the PTES, OSSTMM, NIST SP 800-115, and CREST and can be tailored to various assessment types including...

    Read Article
  • How an IDOR Vulnerability Led to User Profile Modification

    How an IDOR Vulnerability Led to User Profile Modification

    According to the 7th Annual Hacker-Powered Security Report, IDOR makes up 7% of the vulnerabilities reported via the HackerOne platform. Government agencies and automotive organizations saw...

    Read Article
  • How To Find Broken Access Control Vulnerabilities in the Wild

    How To Find Broken Access Control Vulnerabilities in the Wild

    What Is Broken Access Control?BAC is a class of application vulnerability where a function or asset in the application is accessible to someone who should not have access.If you're anything like...

    Read Article
  • NIS2: Next Step Forward on EU Security Requirements

    NIS2: Next Step Forward on EU Security Requirements

    NIS2 focuses on strengthening EU resilience through new and amended obligations for cybersecurity risk management practices, incident reporting, and security audits. NIS2 imposes obligations on...

    Read Article
  • A Guide To Subdomain Takeovers 2.0

    A Guide To Subdomain Takeovers 2.0

    1. Understanding subdomain takeovers2. Identifying vulnerable services3. Examples of vulnerable and secure services4. Enumerating subdomains5. Automating the process of finding subdomain...

    Read Article
  • How to Streamline Your SDLC With Hai

    How to Streamline Your SDLC With Hai

    Addressing Inconsistencies in Vulnerability ScanningOne of the primary challenges of vulnerability scanning is maintaining consistent results. Inconsistencies can lead to missed vulnerabilities,...

    Read Article
  • How to Accelerate Vulnerability Remediation with Hai

    How to Accelerate Vulnerability Remediation with Hai

    The Challenge of Vulnerability RemediationWhen a vulnerability is identified, teams must determine the best approach to fixing it. This involves analyzing the vulnerability's impact, prioritizing...

    Read Article
  • Introducing HackerOne Automations

    Introducing HackerOne Automations

    Efficiency and accuracy are crucial in vulnerability remediation. Yet, repetitive and manual handling of tasks throughout the vulnerability lifecycle remains time-consuming and prone to human...

    Read Article
  • The Rise of Bug Bounty Programs in S-1 Filings: A New Standard in Corporate Security

    The Rise of Bug Bounty Programs in S-1 Filings: A New Standard in Corporate Security

    Learn more about bug bounty programs and how they work >The Growing TrendAt HackerOne, we’ve observed a notable increase in companies mentioning their bug bounty programs in S-1 filings. Some of...

    Read Article
  • Announcing Hai Plays: Personalize Your Playbook for Spot-On Security Advice

    Announcing Hai Plays: Personalize Your Playbook for Spot-On Security Advice

    Take Precision to the Next Level—Beyond Basic AIEfficiency and precision are critical in every operation. However, many security teams face the challenge of repeatedly entering the same...

    Read Article
  • Hack My Career: Harley Kimball’s Journey to DEFCON

    Hack My Career: Harley Kimball’s Journey to DEFCON

    In this interview, we explore Harley's experience at DEFCON, the world’s largest hacker convention, where he took his skills to new heights. His story goes beyond technical expertise; it's about...

    Read Article
  • Capital One Launches Public Bug Bounty Program with HackerOne

    Capital One Launches Public Bug Bounty Program with HackerOne

    What's New? We at Capital One strongly believe in the importance of security, and part of our mission is to protect our customers and their data. As part of this commitment, we launched our...

    Read Article
  • From Prospect to Partner: Jon Stone Shares HackerOne Career Story

    From Prospect to Partner: Jon Stone Shares HackerOne Career Story

    At HackerOne, SDRs focus on prospecting, qualifying leads, and setting up meetings for AEs, while developing these skills to take on more responsibilities, including closing deals and managing...

    Read Article
  • Quantifying the Value of Bug Bounty Programs: ROI, ROM, or Both?

    Quantifying the Value of Bug Bounty Programs: ROI, ROM, or Both?

    HackerOne customers consistently factor in cost savings when measuring the success of their security engagements, with 59% valuing the estimated savings of reputational or customer-related...

    Read Article
  • Crushing FUD: Embracing Ethical Hackers to Strengthen Cybersecurity

    Crushing FUD: Embracing Ethical Hackers to Strengthen Cybersecurity

    What is FUD?Fear, Uncertainty, and Doubt (FUD), are central blockers to high-efficacy security programs by creating a climate of fear and hesitation, which impedes effective decision-making and...

    Read Article
  • Loading More...