Category: Mix

Hackerone logo
29
Jan
2025

New SEC Cybersecurity Regulation: CISO Requirements & Recommendations

The rule requires public companies to report material cybersecurity incidents and annually report on elements of their cybersecurity risk management…

Hackerone logo
29
Jan
2025

Meet 5 Young Hackers Hacking For Good

Recently, a cybercriminal gang targeted the Las Vegas casino scene by extracting an eight-figure ransom from Caesars Entertainment and bringing…

Hackerone logo
29
Jan
2025

2023 Ambassador World Cup: Kicking off the Finals

The Ambassador World Cup So Far Teams & hackers The Ambassador World Cup started out with 29 teams and 677…

Hackerone logo
29
Jan
2025

HackerOne’s EPSS Integration for Better CVE Scoring and Remediation

At HackerOne, we’ve always been committed to helping customers navigate the complex landscape of prioritizing vulnerability remediation. The CVE Discovery…

Hackerone logo
29
Jan
2025

How HackerOne Is Building Responsible Generative AI (3 Use Cases)

HackerOne’s AI can already be used to: 1. Help automate vulnerability detection, using Nuclei, for example 2. Provide a summary…

Hackerone logo
28
Jan
2025

The HackerOne Cake Story | HackerOne

When Jobert and Michiel started their penetration testing consultancy, they ran into a frustrating reality. Convincing companies to trust two…

Hackerone logo
28
Jan
2025

What Will a New Administration and Congress Mean for Cybersecurity and AI Regulation?

Much attention has been paid to the incoming administration’s stated intentions to roll back regulations, as well as their criticism…

Hackerone logo
28
Jan
2025

Salesforce Teams Up With All-Star Hackers at H1-4420

“With help from hackers, Salesforce can consistently put its products and systems to the test, as well as boost security…

Hackerone logo
28
Jan
2025

5 Common Mistakes When Running a Bug Bounty Program (and Solutions)

1. Unprepared to Manage Incoming Vulnerability Reports Naturally, the purpose of running a bug bounty program is to identify vulnerabilities…

Hackerone logo
28
Jan
2025

Bug Bounty Vs. Pentest [Differences Explained]

What Is Pentesting? Pentesting attempts to ethically breach a system’s security for the purpose of vulnerability identification. In most cases,…

A complete guide to finding SSRF vulnerabilities in PDF generators
28
Jan
2025

A complete guide to finding SSRF vulnerabilities in PDF generators

PDF generators are commonly implemented in applications. Developers tend to use these components to generate documents based on dynamic data…

Hackerone logo
28
Jan
2025

How HackerOne Reinvented Security for Developers

Workflow Integration Code security tools need to be accessible in the toolkit developers already use and in the workflows they…