Category: Mix

Hackerone logo
26
Jan
2025

How an MFA Bypass Led to Account Takeover [Plus 11 Authentication Tips]

Many Facets, One Goal A common trope in cybersecurity is “don’t roll your own auth.” There’s a reason for this: implementing…

Hackerone logo
25
Jan
2025

5 Insights Attendees Gained from the Security@ World Tour

If you weren’t lucky enough to catch us at a roadshow event, you’ll be delighted to know you can catch…

Hackerone logo
25
Jan
2025

Network and Information Systems Directive (NIS2) Compliance: What You Need to Know

This blog will break down the NIS2 Directive drawing information from the original directive briefing published by the European Parliament…

Hackerone logo
25
Jan
2025

Why Retail and E-commerce Organizations Trust Security Researchers During the Holiday Shopping Season

Retail and e-commerce organizations are major targets this time of year, which is why proactive security testing is essential to…

Hackerone logo
25
Jan
2025

Is Your Security Ready For Bug Bounty? [5 Questions]

1. Are You Prepared to Manage Incoming Vulnerability Reports? Naturally, the purpose of running a bug bounty program is to…

Hackerone logo
25
Jan
2025

Hai’s Latest Evolution: Intelligence, Context, and More Intuitive UX

Transforming Security Program Management: A Day with Hai Picture this: It’s Monday morning, and your dashboard shows fifteen new vulnerability…

Hackerone logo
25
Jan
2025

Harnessing the Working Genius for Team Success

Employees at HackerOne utilize the Working Genius model, which provides individuals and teams with a straightforward, practical, and effective framework…

Hackerone logo
25
Jan
2025

Hack My Career: Saskia Braucher

When Saskia joined the tech world, she didn’t follow the conventional path of computer science degrees or coding boot camps….

Hackerone logo
25
Jan
2025

New Guidance for Federal AI Procurement Embraces Red Teaming and Other HackerOne Suggestions

Earlier this year, the Office of Management and Budget (OMB), which establishes budget rules for federal agencies, issued a memorandum…

Hackerone logo
25
Jan
2025

Six Years of Proactive Defense: Deribit’s Journey with HackerOne

Q: Why did Deribit launch a bug bounty program? A: I like to view security as an onion where each…

Hackerone logo
25
Jan
2025

Introducing the Wells Fargo Public Bug Bounty Program

Since then, we’ve grown the program, collaborated with HackerOne, and built partnerships within the bug bounty community. The valuable insights…

Hackerone logo
25
Jan
2025

How Crypto and Blockchain Organizations Manage Complex Attack Surfaces With Competitive Security Testing Programs

There are three factors that differentiate crypto and blockchain organizations from other industries; their attack surfaces, their most common vulnerabilities,…