Skip to main content

Application Security

Learn how to prevent vulnerabilities in your applications. We cover current practices in application security, cloud security, API testing, and more.

Customer Stories, Bounty, Application Security, Best Practices

Robinhood Goes Long on Bug Bounty: Q&A with Ian Carroll and @ashwarya

Seven years of bug bounty, 21-hour average time to bounty, 130 hackers thanked, and hackers on both sides of the program: Robinhood’s Ian Carroll...

Application Security, Bounty, New Program Launch

Reddit's Bug Bounty Program Kicks Off: Q&A with Reddit's Allison Miller and Spencer Koch, and Top Program Hacker @RENEKROKA

HackerOne sat down with Reddit’s CISO and VP of Trust, resident Security Wizard, and top hacker to discover...

Application Security, Customer Stories, Bounty, Vulnerability Disclosure, Response

5 Learnings From A Conversation With OP Financial Group's CISO And @mrtuxracer

On 20 January, HackerOne’s CEO, Marten Mickos, sat down for a chat with European hacker, Julien Ahrens a.k.a...

Application Security, Customer Stories, Bounty

LINE on Securing the Application Development Lifecycle with Bug Bounties

HackerOne has a large hacker community and the platform necessary to operate LINE’s bug bounty program. By...

Application Security, Best Practices

What Years of AWS Hacking Tells Us About Building Secure Apps

Years of AWS bug bounties have exposed SSRF vulnerabilities, misconfigurations, and dangling DNS records. What...

Application Security, Bounty, Best Practices, Customer Stories

Quantifying Risk: How do you measure success in security?

When your job is all about avoiding costly incidents and mistakes, it’s hard to put a dollar value on your...

Application Security, News

HackerOne Joins AWS Marketplace as Cloud Vulnerabilities Rise

HackerOne reveals the most common and critical vulnerabilities found in cloud infrastructure and announces its...

Application Security, New Features

HackerOne is Excited to Launch Triage Ratings for Customers and Hackers

For customers and hackers, the triage experience is central to hacker-powered security. Our triagers consist...
Application Security, Bounty

Securing video streaming in sub-Saharan Africa

Maintaining a video streaming service across the whole of Africa is challenge enough, without the added...