HackerOne
The HackerOne Blog
-
Vulnerability Deep Dive: Gaining RCE Through ImageMagick With Frans Rosen
The file upload vulnerability type is as broad in scope as the number of different file types. These vulnerabilities are an ever-present security concern. While the underlying mechanics of how the...
-
Re-live the Security@ magic in our on-demand video library!
Take me there! -
How To Use HackerOne’s Global Vulnerability Policy Map
To help organizations keep up with the shifting landscape of VDP mandates and recommendations, HackerOne has developed the Global Vulnerability Policy Map, an interactive map-based tracker. Users...
-
European Council Adopts Cyber Resilience Act
The CRA will be a game-changing regulation for software and connected product security. The CRA imposes cybersecurity requirements for manufacturers of software and connected products sold in the...
-
Measure Your AI Risk Preparedness with This Interactive Self-Assessment Tool
Effectively managing these risks requires human expertise and strategic oversight. That’s where the AI Risk Readiness Self-Assessment Tool comes in — helping your organization evaluate the...
-
The Recruitment Process: What to Expect When You Apply at HackerOne
If you’re considering applying, here’s a look at what you can expect from the process, from the initial application to joining your onboarding cohort.Application Review Once you submit your...
-
Pentesting for Internal Networks
Testing MethodologiesHackerOne's testing methodologies are grounded in the principles of the PTES, OSSTMM, NIST SP 800-115, and CREST and can be tailored to various assessment types including...
-
How an IDOR Vulnerability Led to User Profile Modification
According to the 7th Annual Hacker-Powered Security Report, IDOR makes up 7% of the vulnerabilities reported via the HackerOne platform. Government agencies and automotive organizations saw...
-
How To Find Broken Access Control Vulnerabilities in the Wild
What Is Broken Access Control?BAC is a class of application vulnerability where a function or asset in the application is accessible to someone who should not have access.If you're anything like...
-
NIS2: Next Step Forward on EU Security Requirements
NIS2 focuses on strengthening EU resilience through new and amended obligations for cybersecurity risk management practices, incident reporting, and security audits. NIS2 imposes obligations on...
-
A Guide To Subdomain Takeovers 2.0
1. Understanding subdomain takeovers2. Identifying vulnerable services3. Examples of vulnerable and secure services4. Enumerating subdomains5. Automating the process of finding subdomain...
-
How to Streamline Your SDLC With Hai
Addressing Inconsistencies in Vulnerability ScanningOne of the primary challenges of vulnerability scanning is maintaining consistent results. Inconsistencies can lead to missed vulnerabilities,...
-
How to Accelerate Vulnerability Remediation with Hai
The Challenge of Vulnerability RemediationWhen a vulnerability is identified, teams must determine the best approach to fixing it. This involves analyzing the vulnerability's impact, prioritizing...
-
Introducing HackerOne Automations
Efficiency and accuracy are crucial in vulnerability remediation. Yet, repetitive and manual handling of tasks throughout the vulnerability lifecycle remains time-consuming and prone to human...
-
The Rise of Bug Bounty Programs in S-1 Filings: A New Standard in Corporate Security
Learn more about bug bounty programs and how they work >The Growing TrendAt HackerOne, we’ve observed a notable increase in companies mentioning their bug bounty programs in S-1 filings. Some of...
-
Announcing Hai Plays: Personalize Your Playbook for Spot-On Security Advice
Take Precision to the Next Level—Beyond Basic AIEfficiency and precision are critical in every operation. However, many security teams face the challenge of repeatedly entering the same...
-
Hack My Career: Harley Kimball’s Journey to DEFCON
In this interview, we explore Harley's experience at DEFCON, the world’s largest hacker convention, where he took his skills to new heights. His story goes beyond technical expertise; it's about...
-
Capital One Launches Public Bug Bounty Program with HackerOne
What's New? We at Capital One strongly believe in the importance of security, and part of our mission is to protect our customers and their data. As part of this commitment, we launched our...
-
From Prospect to Partner: Jon Stone Shares HackerOne Career Story
At HackerOne, SDRs focus on prospecting, qualifying leads, and setting up meetings for AEs, while developing these skills to take on more responsibilities, including closing deals and managing...
-
Quantifying the Value of Bug Bounty Programs: ROI, ROM, or Both?
HackerOne customers consistently factor in cost savings when measuring the success of their security engagements, with 59% valuing the estimated savings of reputational or customer-related...
-
Crushing FUD: Embracing Ethical Hackers to Strengthen Cybersecurity
What is FUD?Fear, Uncertainty, and Doubt (FUD), are central blockers to high-efficacy security programs by creating a climate of fear and hesitation, which impedes effective decision-making and...
-
Loading More...