Skip to main content

HackerOne Blog

Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.

Vulnerability Management

Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve

Hacker Engagement

First impressions matter! Win hackers over early on and create “anchor” hackers - program stalwarts that learn all about the...

Ethical Hacker

Bug Bounty vs. CTF [Understanding Differences & Benefits]

Trying to understand the difference between a bug bounty vs. CTF? We explain the differences, the similarities...

Penetration Testing

Bug Bounty vs. Penetration Testing: Differences Explained

What is the Difference Between Bug Bounties and Penetration Testing? Organizations offer ongoing bug bounties...
Vulnerability Disclosure, Bounty

HackerOne in DevSecOps

I’m not going to define DevSecOps in yet another blog post. There are plenty of great resources for that. I do...
Vulnerability Management, Vulnerability Disclosure, Bounty

What is Vulnerability Scanning? [And How to Do It Right]

Wondering what vulnerability scanning is? We will explain how it works, why you need to do it, and how to do...
Vulnerability Management

HOW HACKERONE AND GITHUB NOW WORK BETTER TOGETHER

Developers need to bring security into their workflows without pivoting to separate security tools to get...
Vulnerability Management, Bounty, Customer Stories, Best Practices

Citrix's Hacker-Powered Security Growth Plan: Q&A with Abhijith Chandrashekar

With over 400,000 customers, Citrix is a recognized industry leader in both digital workspace technology and...
Vulnerability Management

How Hackers Can Help Reduce Your Organization's Application Risk on AWS

HackerOne recently hosted AWS and a panel of expert ethical hackers to discuss how Server-Side Request Forgery...
Penetration Testing

What Is Penetration Testing? How Does It Work Step-by-Step?

Are you wondering about penetration testing? We give a full explanation of what pentesting is, what the...