Skip to main content

HackerOne Blog

Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.

Vulnerability Management

Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve

Hacker Engagement

First impressions matter! Win hackers over early on and create “anchor” hackers - program stalwarts that learn all about the...

Application Security

How Human Testers Improve Application Security

A suite of DevSecOps tools is available to automate reviews, audits, tests, and scans throughout the...
Company News, Vulnerability Management, Ethical Hacker

Introducing Program Levels: Hacker-friendly Practices that Improve Program Results

The ethical hacker community is one of the most powerful security resources available to any organization. We...

Customer Stories, Best Practices, Bounty

How OneWeb is Safeguarding its Assets with the Hacker Community

HackerOne sat down with Wendy Ng, Principal Cloud Security Architect at OneWeb, to talk about their experience...

Vulnerability Management, Company News

Introducing HackerOne Assets

Understanding where the critical flaws lie within your organization's attack surface is critical—but...

Bounty, Best Practices, Customer Stories

TikTok Celebrates Two Years of Bug Bounty

TikTok, a social media giant with more than 1 billion active monthly users, understands the importance of a...

Bounty, Customer Stories

Announcing the Results of Hack U.S.

On July 4th, 2022, Chief Digital and Artificial Intelligence Office (CDAO), Directorate for Digital Services...

Pentests, Penetration Testing

Use Hackerone’s Enhanced Pentest as a Service to Streamline Security Testing

New capabilities improve pentesting to increase attack resistance The enhanced features drive robust security...
Application Security, Penetration Testing, Vulnerability Management

Introducing Unified HackerOne Scope Management with Burp Suite Support

This post will start with the basics of defining scope and how ethical hackers and testers use it in their...