HackerOne Blog
Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.
Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve
Hacker Engagement
First impressions matter! Win hackers over early on and create “anchor” hackers - program stalwarts that learn all about the...
How to Catch Injection Security Vulnerabilities in Code Review
Injection vulnerabilities result from insecure handling of user inputs. They are relatively simple to fix once...
Severe Confluence Vulnerability is an Active Threat (CVE-2022-26134)
How Critical Infrastructure Can be Protected from Threats
Accessing a major critical infrastructure network is very appealing to cybercriminals, as they can maximize...
Ethical Hackers Help Beiersdorf Minimize Risk and Protect Their Attack Surface
After a year of running a private Vulnerability Disclosure Program (VDP), Beiersdorf is announcing the launch...
What Is a Security.txt File and How Can It Help Your Program?
5 Ways I Provide Value as a PullRequest Reviewer When I Start Reviewing a New Project
Important reviewer traits for providing a great code review include prior knowledge and experience, expertise...