Category: Mix
This is where ethical hackers come in. During a recent panel at Infosecurity Europe, we heard from security professionals at…
With a high-stakes battle between OpenAI and its alleged Chinese rival, DeepSeek, API security was catapulted to priority number one…
What Is Security Advisory Services (SAS)? Security Advisory Services (SAS) is a value optimization service designed to help our customers…
HackerOne CEO, Marten Mickos, emailed the following note to employees on August 2, 2023. H1 Team, I have made the painful…
Browse by LLM vulnerability: LLM01: Prompt Injection What Is Prompt Injection? One of the most commonly discussed LLM vulnerabilities, Prompt…
SEC’s Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure Rule The SEC’s final rule is aimed at helping investors make…
Over the course of a few weeks, we had conversations with 50+ CISOs and security leaders from a wide range…
Federal contractors play a critical role in supporting the U.S. government. Because of their access to federal systems and data,…
Future Risk Predictions In a recent presentation at Black Hat 2023, HackerOne Founder, Michiel Prins, and hacker, Joseph Thacker aka…
In an era where data breaches and cyberattacks dominate headlines, a new and unconventional approach to cybersecurity has emerged, challenging…
Originally published in Security Magazine When the pandemic hurled us into a cybersecurity crisis, there were some who held out…
Earlier this year, I was part of a HackerOne team that developed the Women in Sales Employee Resource Group (ERG)….


![How Security Advisory Services Strengthen Your SDLC [New Service] Hackerone logo](https://image.cybernoz.com/wp-content/uploads/2025/01/How-Security-Advisory-Services-Strengthen-Your-SDLC-New-Service-360x270.png)

![10 LLM Vulnerabilities and How to Establish LLM Security [OWASP] Hackerone logo](https://image.cybernoz.com/wp-content/uploads/2025/01/10-LLM-Vulnerabilities-and-How-to-Establish-LLM-Security-OWASP-360x270.png)
![What to Know About the New SEC Cybersecurity Rule [3 Requirements] Hackerone logo](https://image.cybernoz.com/wp-content/uploads/2025/01/What-to-Know-About-the-New-SEC-Cybersecurity-Rule-3-360x270.png)
![How Ethical Hackers Help the CISO Budget [4 Takeaways from CISOs] Hackerone logo](https://image.cybernoz.com/wp-content/uploads/2025/01/How-Ethical-Hackers-Help-the-CISO-Budget-4-Takeaways-from-360x270.png)

![Generative AI and Cybersecurity [The Hacker Perspective] Hackerone logo](https://image.cybernoz.com/wp-content/uploads/2025/01/Generative-AI-and-Cybersecurity-The-Hacker-Perspective-360x270.png)


