Skip to main content

HackerOne Blog

Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.

Vulnerability Management

Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve

Hacker Engagement

First impressions matter! Win hackers over early on and create “anchor” hackers - program stalwarts that learn all about the...

Vulnerability Management

Introducing HackerOne Assets

A Security Survey on How to Close Your Organization's Attack Resistance Gap

Company News, Application Security

Why HackerOne Acquired Pull Request and What It Means to Our Customers

Security vulnerabilities are a significant workflow disruption when discovered near the end of development...
Vulnerability Disclosure, Customer Stories, Response

Announcing the Results of the 12-month DIB-VDP Pilot

Learn more about the DoD DIB-VDP Pilot here.
Customer Stories, Application Security, Best Practices, Bounty, Vulnerability Management

How Wix Improves Their Security Posture with Ethical Hackers

Reducing risk is fundamental to Wix’s approach to cybersecurity, and as the threat landscape evolves, they...

Company News, Vulnerability Management

Announcing the HackerOne 2022 Attack Resistance Report: A Security Survey—How to Close Your Organization's Attack Resistance Gap

Today, HackerOne published The 2022 Attack Resistance Report: A HackerOne Security Survey. Our research...

Customer Stories, Best Practices, Bounty

How Ethical Hackers Help A.S. Watson Address Digital Risk

We recently met with A.S. Watson’s Chief Information Security Officer (CISO), Feliks Voskoboynik, to learn how...

Best Practices

Preventing Compromised Password Reuse on HackerOne.com

This week, we rolled out an improvement to account security on the HackerOne website. We now block the use of...
Bounty, Best Practices, Customer Stories

Shifting Left with Ethical Hackers: A Q&A with GitLab

Secure applications start with secure code. As organizations deploy code faster than ever, implementing...