Skip to main content

Penetration Testing

Follow the latest practices in penetration testing including API testing, application testing, external networks, internet-facing infrastructure, and more.

Penetration Testing

HackerOne Named a Leader in Penetration Testing as a Service (PTaaS) GigaOm Radar Report

The report provides a technical evaluation of key PTaaS vendor offerings in the market. A select group of seven vendors were invited to participate in...

Penetration Testing

HackerOne Named a Leader in Penetration Testing as a Service (PTaaS) GigaOm Radar Report

The report provides a technical evaluation of key PTaaS vendor offerings in the market. A select group of...
Pentests, Penetration Testing

Use Hackerone’s Enhanced Pentest as a Service to Streamline Security Testing

New capabilities improve pentesting to increase attack resistance The enhanced features drive robust security...
Application Security, Penetration Testing, Vulnerability Management

Introducing Unified HackerOne Scope Management with Burp Suite Support

This post will start with the basics of defining scope and how ethical hackers and testers use it in their...
Penetration Testing, Vulnerability Management

Benchmark Analysis: Annual Pentest and Code Review Coverage

Security leaders often struggle to keep pace with the evolving nature of their respective attack surfaces...
Assessments, Penetration Testing

HackerOne Announces a New Customer Pentest Setup that's More Efficient and Speeds Time to Launch

This improved experience reduces time to launch, which is vital when your organization is up against an urgent...
Best Practices, Customer Stories, Bounty, Penetration Testing

Jedox’s Journey with HackerOne: A Q&A with CTO, Vladislav Maličević

Jedox secures their cloud - and their customers - with HackerOne Assessments and HackerOne Bounty. Read this...

Penetration Testing, Ethical Hacker, Application Security

HackerOne Announces Hacker-Powered Cloud Security Capabilities for AWS Customers

HackerOne announces new capabilities for AWS customers looking to improve security in their cloud applications...

Penetration Testing

Bug Bounty vs. Penetration Testing: Differences Explained

What is the Difference Between Bug Bounties and Penetration Testing? Organizations offer ongoing bug bounties...