Code Reviews, Small Moments, Big Impacts
Multiplying At HackerOne, we use the Spotify Engineering Framework, meaning we work in Squads. Each Squad is a mini-team focused...
Read more →Multiplying At HackerOne, we use the Spotify Engineering Framework, meaning we work in Squads. Each Squad is a mini-team focused...
Read more →The Significance of Credential Rotations In today’s digital landscape, the significance of regular credential rotations cannot be overstated. Unfortunately, not...
Read more →Brian Krebs has reported that “Those sources said the breach appears to have started when the attackers somehow gained access...
Read more →In Part 1 of our Pre-Pentest Checklist Series, we explored the foundational aspects of pentesting—focusing on the “what” and “why” to...
Read more →Mike Eaton | 18 April 2024 at 13:56 UTC We’re excited to announce that Burp Suite Enterprise Edition is now...
Read more →Getting into bug bounties is no easy task, we know. There’s so much to consider and your path to becoming...
Read more →We’re excited to introduce the new read-only user roles to our platform, available under the roles “Program reader” and “Group...
Read more →A severe command injection vulnerability in the GlobalProtect Gateway feature of PAN-OS versions 10.2, 11.0, and 11.1 underscores the critical...
Read more →Each year, HackerOne employees nominate peers to receive the covetable Values Awards. Five Hackeronies are recognized for their unique contribution...
Read more →Factoring in whether to allocate resources for a bug bounty program in your annual cybersecurity budget can be a challenging...
Read more →Race condition vulnerabilities make up less than 0.3% of reports on the HackerOne platform. However, researchers have recently been particularly...
Read more →This is an overview of the conversation and some of the best practices shared when creating a remote workplace. Listen...
Read more →