Skip to main content

HackerOne Blog

Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.

Vulnerability Management

Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve

Hacker Engagement

First impressions matter! Win hackers over early on and create “anchor” hackers - program stalwarts that learn all about the...

Vulnerability Management

Log4j Vulnerability Activity on the HackerOne Platform

This post is about the severe and widespread Log4j vulnerability. It gives a technical overview of the...

Vulnerability Management

What Is The Common Vulnerability Scoring System (CVSS)

Were you wondering about the Common Vulnerability Scoring System (CVSS)? We explain what CVSS is, why it is...

Security At Event, Vulnerability Management

How Hackers Help Organizations Face New Attack Vectors and Build Stronger Security Programs

The risk of cyberattacks grows every day. But there is an essential defensive step that organizations can take...

Vulnerability Management

Vulnerability Management | A Complete Guide and Best Practices

We explain what vulnerability management is and why it matters, and we give a step-by-step guide to...

Vulnerability Management

Securing the Supply Chain by Working With Ethical Hackers

Software supply chain attacks increasingly create concern among cybersecurity experts as these exploits are...

Customer Stories, Bounty, New Program Launch

TikTok Celebrates One Year of Bug Bounty

As part of an ongoing commitment to proactive cybersecurity, TikTok celebrated its one-year anniversary of...

Vulnerability Management

Bug Bounty Platforms [Best Choices For a Bug Bounty Program]

Are you wondering about bug bounty platforms? We explain what a bug bounty platform is and how it can help you...

November 2nd, 2021

How Elastic Attracts and Retains Top Hackers Without Offering the Highest Bounties

Skilled hackers are the foundation of an effective bug bounty program. But how can you ensure your program...