HackerOne Blog
Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.
Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve
Hacker Engagement
First impressions matter! Win hackers over early on and create “anchor” hackers - program stalwarts that learn all about the...
Donating Bounties to Humanitarian Efforts in Ukraine
Securing Digital Transformation with Vulnerability Disclosure: A Q&A with John Deere CISO, James Johnson
To help fortify security defenses for their customers, dealers, suppliers, and employees, John Deere recently...
The Only Solution That Scales With the Cybersecurity Challenge
Nine Months into the DIB-VDP Pilot, Nearly 1,000 Valid Vulnerabilities Have Been Identified
With three months left in the 12-month pilot with the Department of Defense’s Defense Industrial Base...
The HackerOne Global Top 10—Hacker Expertise, Industry Data, and Up-to-Date Vulnerabilities
Log4Shell: Attack Evolution
HackerOne has unique visibility into the global response to Log4Shell, seeing in real time how organizations...
Top 5 Takeaways from the 2021 Hacker-Powered Security Report: Industry Insights
CWE (Common Weakness Enumeration) and the CWE Top 25 Explained
Are you wondering about CWE? We explain CWE (Common Weakness Enumeration) and why this community-based...