Skip to main content

HackerOne Blog

Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.

Vulnerability Management

Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve

Hacker Engagement

First impressions matter! Win hackers over early on and create “anchor” hackers - program stalwarts that learn all about the...

August 5th, 2022

H1-702 Las Vegas Day 3: Switching Up Scopes

It is a new day with new challenges. Scope has shifted for the next part of our LHE. Today, you can feel the...
August 4th, 2022

H1-702 Las Vegas Day 2: Hacking with Zoom

Welcome back to our first day of in-person hacking! We had some lovely people greeting you today for your...
August 3rd, 2022

H1-702 Las Vegas Day 1: H@cktivitycon

After a day of prep, we were ready to launch into our first day of H1-702! What makes today special is the...
August 2nd, 2022

H1-702 Las Vegas Day 0: Setup

Hackers! We have made it to Las Vegas! We are here for a live hacking event (LHE). All live hacking events are...
Live Hacking Events

PayPal's Third LHE Brings Top Global Hackers to the Virtual Stage

After ten years of partnering with hackers, PayPal is a leader in cybersecurity and hacker relationship...

Penetration Testing, Vulnerability Management

Benchmark Analysis: Annual Pentest and Code Review Coverage

Security leaders often struggle to keep pace with the evolving nature of their respective attack surfaces...
Vulnerability Management

5 Articles to Get You Up-to-Speed on Bug Bounty Programs

Many organizations use bug bounty programs to help them protect their ever-expanding attack surface and...

Application Security, Vulnerability Management

Security Highlights: New CWE Rankings, Software Supply Chains, and Side-Channel Attacks

MITRE Releases 2022 CWE Top 25 The popular CWE Top 25 list, which ranks the most dangerous software...