Skip to main content

HackerOne Blog

Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.

Vulnerability Management

Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve

Hacker Engagement

First impressions matter! Win hackers over early on and create “anchor” hackers - program stalwarts that learn all about the...

March 3rd, 2022

Donating Bounties to Humanitarian Efforts in Ukraine

In 2020, we launched the Hack for Good program to allow ethical hackers to donate their bounties to charitable...
Vulnerability Disclosure, Response, Customer Stories

Securing Digital Transformation with Vulnerability Disclosure: A Q&A with John Deere CISO, James Johnson

To help fortify security defenses for their customers, dealers, suppliers, and employees, John Deere recently...

From The CEO, Company News

The Only Solution That Scales With the Cybersecurity Challenge

Cybersecurity is stretched thin. We all know it, so why state it again? Because cybersecurity is thinner today...
Customer Stories, Response, Vulnerability Disclosure

Nine Months into the DIB-VDP Pilot, Nearly 1,000 Valid Vulnerabilities Have Been Identified

With three months left in the 12-month pilot with the Department of Defense’s Defense Industrial Base...

Vulnerability Management

The HackerOne Global Top 10—Hacker Expertise, Industry Data, and Up-to-Date Vulnerabilities

Many security teams use the OWASP Top 10 as a guideline to understand where they should focus their security...
Vulnerability Management, Vulnerability Disclosure

Log4Shell: Attack Evolution

HackerOne has unique visibility into the global response to Log4Shell, seeing in real time how organizations...

Hacker Powered Security Report

Top 5 Takeaways from the 2021 Hacker-Powered Security Report: Industry Insights

For the fifth year in a row, HackerOne published a report that provides insights from the world’s largest...
Vulnerability Management

CWE (Common Weakness Enumeration) and the CWE Top 25 Explained

Are you wondering about CWE? We explain CWE (Common Weakness Enumeration) and why this community-based...