Skip to main content

Application Security

Learn how to prevent vulnerabilities in your applications. We cover current practices in application security, cloud security, API testing, and more.

Customer Stories, Bounty, Application Security, Best Practices

Robinhood Goes Long on Bug Bounty: Q&A with Ian Carroll and @ashwarya

Seven years of bug bounty, 21-hour average time to bounty, 130 hackers thanked, and hackers on both sides of the program: Robinhood’s Ian Carroll...

Application Security

5 Ways I Provide Value as a PullRequest Reviewer When I Start Reviewing a New Project

Important reviewer traits for providing a great code review include prior knowledge and experience, expertise...

Company News, Application Security

Why HackerOne Acquired Pull Request and What It Means to Our Customers

Security vulnerabilities are a significant workflow disruption when discovered near the end of development...
Customer Stories, Application Security, Best Practices, Bounty, Vulnerability Management

How Wix Improves Their Security Posture with Ethical Hackers

Reducing risk is fundamental to Wix’s approach to cybersecurity, and as the threat landscape evolves, they...

Application Security

The Top 5 Cloud Security Risks: How Hacker-Powered Security Can Help

Widespread digital transformation means increased cloud security risk. Learn how human intelligence—hacker...

Penetration Testing, Ethical Hacker, Application Security

HackerOne Announces Hacker-Powered Cloud Security Capabilities for AWS Customers

HackerOne announces new capabilities for AWS customers looking to improve security in their cloud applications...

Vulnerability Disclosure, Customer Stories, Best Practices, Application Security, Response

The DOD Improves Their Security Posture Through the DIB-VDP

One of the primary missions of the Defense Counterintelligence and Security Agency (DCSA) is to provide...

Application Security

How the Industry’s First Hacker-Powered API Helps Hackers Automate Workflows

Today, HackerOne is launching the industry’s first hacker API. This release is now out of beta and is...
Application Security, Data and Analysis

Spotlight on the Server-Side

Server-side request forgery (or SSRF) vulnerabilities are particularly dangerous because they can lead to...