Category: Mix

Hackerone logo
11
Dec
2024

Introducing the Wells Fargo Public Bug Bounty Program

Since then, we’ve grown the program, collaborated with HackerOne, and built partnerships within the bug bounty community. The valuable insights…

11
Dec
2024

Top Tool Capabilities to Prevent AI-Powered Attacks

Recent advances in AI technologies have granted organizations and individuals alike unprecedented productivity, efficiency, and operational benefits. AI is, without…

Hackerone logo
10
Dec
2024

New Guidance for Federal AI Procurement Embraces Red Teaming and Other HackerOne Suggestions

Earlier this year, the Office of Management and Budget (OMB), which establishes budget rules for federal agencies, issued a memorandum…

Hackerone logo
06
Dec
2024

Harnessing the Working Genius for Team Success

Employees at HackerOne utilize the Working Genius model, which provides individuals and teams with a straightforward, practical, and effective framework…

Staying safe with multi-layered defense
05
Dec
2024

Staying safe with multi-layered defense

Before diving into security controls or implementing bug bounty programs, to first establish a strong foundation in risk management and…

Hackerone logo
05
Dec
2024

Hai’s Latest Evolution: Intelligence, Context, and More Intuitive UX

Transforming Security Program Management: A Day with Hai Picture this: It’s Monday morning, and your dashboard shows fifteen new vulnerability…

Protecting Against Bot-Enabled API Abuse
04
Dec
2024

Protecting Against Bot-Enabled API Abuse

APIs have become the backbone of modern digital ecosystems, powering everything from mobile apps to e-commerce platforms. However, as APIs…

Frontview Mirror: 2025 Edition
04
Dec
2024

Frontview Mirror: 2025 Edition

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; } .bh__table_cell { padding: 5px; background-color: #FFFFFF; } .bh__table_cell p { color:…

A complete guide to exploiting advanced authentication vulnerabilities
03
Dec
2024

A complete guide to exploiting advanced authentication vulnerabilities

Authentication vulnerabilities are fun to find as they are impactful by nature and often grant unauthorized users access to various…

Hackerone logo
28
Nov
2024

The Only Solution That Scales With the Cybersecurity Challenge

Cybersecurity is stretched thin. We all know it, so why state it again?  Because cybersecurity is thinner today than yesterday….

Hackerone logo
28
Nov
2024

Why Economic Downturns Put Innovation at Risk And Threaten Cybersafety

The tech sector breathed a sigh of relief when the Federal Reserve confirmed its bail out of Silicon Valley Bank…

Hackerone logo
28
Nov
2024

Make Your Cybersecurity Dollars Last Longer

In my last blog, I examined why cybercrime increases during economic hardship and why innovation and vigilance are necessary to…