Category: Mix
What Is Security Advisory Services (SAS)? Security Advisory Services (SAS) is a value optimization service designed to help our customers…
HackerOne CEO, Marten Mickos, emailed the following note to employees on August 2, 2023. H1 Team, I have made the painful…
Browse by LLM vulnerability: LLM01: Prompt Injection What Is Prompt Injection? One of the most commonly discussed LLM vulnerabilities, Prompt…
SEC’s Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure Rule The SEC’s final rule is aimed at helping investors make…
Over the course of a few weeks, we had conversations with 50+ CISOs and security leaders from a wide range…
Federal contractors play a critical role in supporting the U.S. government. Because of their access to federal systems and data,…
Future Risk Predictions In a recent presentation at Black Hat 2023, HackerOne Founder, Michiel Prins, and hacker, Joseph Thacker aka…
In an era where data breaches and cyberattacks dominate headlines, a new and unconventional approach to cybersecurity has emerged, challenging…
Originally published in Security Magazine When the pandemic hurled us into a cybersecurity crisis, there were some who held out…
Earlier this year, I was part of a HackerOne team that developed the Women in Sales Employee Resource Group (ERG)….
The HackerOnesie instantly became famous the day it was introduced in 2017. Although it has been known to carry magical…
The program began in 2021 as an internal resource for engineers to be mentors and mentees. Mentors build their leadership…
![How Security Advisory Services Strengthen Your SDLC [New Service] Hackerone logo](https://image.cybernoz.com/wp-content/uploads/2025/01/How-Security-Advisory-Services-Strengthen-Your-SDLC-New-Service-360x270.png)

![10 LLM Vulnerabilities and How to Establish LLM Security [OWASP] Hackerone logo](https://image.cybernoz.com/wp-content/uploads/2025/01/10-LLM-Vulnerabilities-and-How-to-Establish-LLM-Security-OWASP-360x270.png)
![What to Know About the New SEC Cybersecurity Rule [3 Requirements] Hackerone logo](https://image.cybernoz.com/wp-content/uploads/2025/01/What-to-Know-About-the-New-SEC-Cybersecurity-Rule-3-360x270.png)
![How Ethical Hackers Help the CISO Budget [4 Takeaways from CISOs] Hackerone logo](https://image.cybernoz.com/wp-content/uploads/2025/01/How-Ethical-Hackers-Help-the-CISO-Budget-4-Takeaways-from-360x270.png)

![Generative AI and Cybersecurity [The Hacker Perspective] Hackerone logo](https://image.cybernoz.com/wp-content/uploads/2025/01/Generative-AI-and-Cybersecurity-The-Hacker-Perspective-360x270.png)




