Peace of mind from security’s ethical hackers greatest minds
Increase your resistance to attack by tapping the world’s top ethical hackers. Understand your attack surface, hunt bugs, test apps, and fix vulnerabilities before anyone else knows they exist.
HackerOne The HackerOne Blog
- A New Approach to Proving Cybersecurity Value (That Isn’t ROI)by Naz Bozdemir on February 14, 2025 at 11:12 pm
In this blog, we are excited to announce our white paper on Return on Mitigation (RoM), a framework we designed to quantify the financial impact of security programs in a way that speaks to business leaders.
- Celebrating 10 Years of Partnership: Snap and HackerOne Reach $1M in Bountiesby HackerOne on February 14, 2025 at 7:19 pm
At Snap, security is more than a priority—it’s a core mission. Over the past decade, Snap has partnered with HackerOne to build and sustain a robust bug bounty program. This collaboration has led to major milestones, including paying security researchers over $1M in bounties. To celebrate this achievement and their 10-year partnership, we spoke with Jim Higgins, Snap’s Chief Information Security Officer, Vinay Prabhushankar, Snap’s Security Engineering Manager, and Ilana Arbisser, Snap’s Privacy Engineer.
- Women@ Kicks Off the Year with a Vision Board Eventby Marina Briones on February 11, 2025 at 6:01 pm
- Gain Actionable, Data-backed Insights with HackerOne Recommendationsby Caroline Collins on February 6, 2025 at 11:21 pm
What if your security program could self-optimize: analyze trends, identify weak points, and proactively propose actionable steps to strengthen defenses? With HackerOne Recommendations, it can.
- Welcome, Hackbots: How AI Is Shaping the Future of Vulnerability Discoveryby Michiel Prins on February 3, 2025 at 6:27 pm
What are Hackbots and how are they impacting vulnerability discovery and the researcher community?
- DORA Compliance Is Here: What Financial Entities Should Knowby Vanessa Booth on January 31, 2025 at 5:52 pm
The new DORA regulation: everything your organization needs to know about its impact and how to comply.
- The HackerOne Cake Storyby Marina Briones on January 28, 2025 at 7:28 pm
- What Will a New Administration and Congress Mean for Cybersecurity and AI Regulation?by Ilona Cohen on January 28, 2025 at 5:30 pm
The HackerOne Policy team analyzes cybersecurity and AI regulation in the U.S. under the incoming administration.
- How HackerOne Reinvented Security for Developersby Dan Mateer on January 27, 2025 at 5:39 pm
Applying human-in-the-loop principles creates application security controls loved by developers. See how.
- Hope in the Fight Against Cyber Threats: A New Year’s Message to CISOsby Kara Sprague on January 23, 2025 at 5:18 pm
HackerOne CEO Kara Sprague explores how the modern CISO can face mounting pressures in cybersecurity.
- Resurrecting Shift-Left With Human-in-the-loop AIby Alex Rice on January 16, 2025 at 9:30 pm
Let’s explore how human-in-the-loop AI can help implement successful secure-by-design.
- Introducing Lightspark’s Public Bug Bounty Programby HackerOne on January 15, 2025 at 5:57 pm
Lightspark is excited to announce the launch of its public bug bounty program with HackerOne.
- A Partial Victory for AI Researchersby Ilona Cohen on January 10, 2025 at 6:37 pm
What is the Digital Millennium Copyright Act and what are the implications of its recent ruling for AI researchers?
- ROI Isn’t Cutting It: 6 Questions to Help CISOs Better Quantify Security Investmentsby Naz Bozdemir on January 7, 2025 at 7:07 pm
Why ROI is not the most effective method to quantify cybersecurity investments — and how ROM can help.
- The OWASP Top 10 for LLMs 2025: How GenAI Risks Are Evolvingby Manjesh S. on December 18, 2024 at 9:19 pm
The new OWASP Top 10 for LLMs is here. How has it changed, and how can organizations prevent GenAI risks?
- Breaking Down the OWASP Top 10: Insecure Designby Andrew Pratt on December 17, 2024 at 10:23 pm
Learn about the different types of insecure design vulnerabilities and how to identify them.
- New York Releases AI Cybersecurity Guidance: What You Need to Knowby Ilona Cohen on December 16, 2024 at 9:37 pm
What does New York’s new AI Cybersecurity Guidance mean for financial institutions and other regulated companies?
- Azure Cloud Configuration Reviewby Paul De Baldo V on December 13, 2024 at 9:55 pm
Learn the testing methodologies and security best practices for Azure Cloud Configuration Review.
- How a Privilege Escalation Led to Unrestricted Admin Account Creation in Shopifyby Andrew Pratt on December 12, 2024 at 10:50 pm
This Shopify privilege escalation vulnerability could have resulted in the creation of unrestricted admin accounts.
- How Crypto and Blockchain Organizations Manage Complex Attack Surfaces With Competitive Security Testing Programsby HackerOne on December 12, 2024 at 10:02 pm
What makes securing crypto and blockchain organizations so different than other industries? Let’s look at the data.
- Introducing the Wells Fargo Public Bug Bounty Programby HackerOne on December 10, 2024 at 10:58 pm
Wells Fargo announces its public bug bounty program after several years of engaging the HackerOne community.
- Six Years of Proactive Defense: Deribit’s Journey with HackerOneby HackerOne on December 10, 2024 at 10:28 pm
Learn how Deribit uses its HackerOne bug bounty program for its proactive security strategy.
- New Guidance for Federal AI Procurement Embraces Red Teaming and Other HackerOne Suggestionsby Michael Woolslayer on December 9, 2024 at 10:21 pm
The U.S. government has embraced HackerOne’s recommendations for the new federal AI procurements guidance.
- Hack My Career: Saskia Braucherby Marina Briones on December 6, 2024 at 11:40 pm
- Harnessing the Working Genius for Team Successby debbie@hackerone.com on December 5, 2024 at 10:07 pm
- Hai’s Latest Evolution: Intelligence, Context, and More Intuitive UXby Martijn Russchen on December 3, 2024 at 8:56 pm
Hai, HackerOne’s AI copilot has 3 new capabilities: Hai analytics, contextual conversations, and an enhanced user experience.
- 5 Questions to Assess Your Organization’s Bug Bounty Readinessby Josh Jacobson on December 2, 2024 at 9:30 pm
Is your organization ready for a bug bounty program? These 5 questions will help assess your security program’s bug bounty readiness.
- Why Retail and E-commerce Organizations Trust Security Researchers During the Holiday Shopping Seasonby HackerOne on November 27, 2024 at 6:14 pm
Security leaders at REI, AS Watson, and Mercado Libre explain why retail and e-commerce organizations trust security researchers.
- Network and Information Systems Directive (NIS2) Compliance: What You Need to Knowby Sandeep Singh on November 26, 2024 at 5:43 pm
Learn about the new NIS2 Directive requirements and how to achieve compliance through pentesting, VDP, and bug bounty.
- 5 Insights Attendees Gained from the Security@ World Tourby HackerOne on November 25, 2024 at 10:58 pm
Read the top 5 learnings attendees gained by joining one of our Security@ 2024 World Tour events.