Category: Mix

Hackerone logo
14
Dec
2024

How Crypto and Blockchain Organizations Manage Complex Attack Surfaces With Competitive Security Testing Programs

There are three factors that differentiate crypto and blockchain organizations from other industries; their attack surfaces, their most common vulnerabilities,…

Hackerone logo
14
Dec
2024

How a Privilege Escalation Led to Unrestricted Admin Account Creation in Shopify

In a privilege escalation attack, an attacker gains elevated rights, permissions, or entitlements beyond the intended level associated with their…

The key to ensuring software quality and reliability
13
Dec
2024

The key to ensuring software quality and reliability

Regression testing is a crucial part of software development that ensures new code changes don’t negatively affect existing functionality. It…

Hackerone logo
12
Dec
2024

Hack My Career: Saskia Braucher

When Saskia joined the tech world, she didn’t follow the conventional path of computer science degrees or coding boot camps….

Hackerone logo
11
Dec
2024

Six Years of Proactive Defense: Deribit’s Journey with HackerOne

Q: Why did Deribit launch a bug bounty program? A: I like to view security as an onion where each…

Hackerone logo
11
Dec
2024

Introducing the Wells Fargo Public Bug Bounty Program

Since then, we’ve grown the program, collaborated with HackerOne, and built partnerships within the bug bounty community. The valuable insights…

11
Dec
2024

Top Tool Capabilities to Prevent AI-Powered Attacks

Recent advances in AI technologies have granted organizations and individuals alike unprecedented productivity, efficiency, and operational benefits. AI is, without…

Hackerone logo
10
Dec
2024

New Guidance for Federal AI Procurement Embraces Red Teaming and Other HackerOne Suggestions

Earlier this year, the Office of Management and Budget (OMB), which establishes budget rules for federal agencies, issued a memorandum…

Hackerone logo
06
Dec
2024

Harnessing the Working Genius for Team Success

Employees at HackerOne utilize the Working Genius model, which provides individuals and teams with a straightforward, practical, and effective framework…

Staying safe with multi-layered defense
05
Dec
2024

Staying safe with multi-layered defense

Before diving into security controls or implementing bug bounty programs, to first establish a strong foundation in risk management and…

Hackerone logo
05
Dec
2024

Hai’s Latest Evolution: Intelligence, Context, and More Intuitive UX

Transforming Security Program Management: A Day with Hai Picture this: It’s Monday morning, and your dashboard shows fifteen new vulnerability…

Protecting Against Bot-Enabled API Abuse
04
Dec
2024

Protecting Against Bot-Enabled API Abuse

APIs have become the backbone of modern digital ecosystems, powering everything from mobile apps to e-commerce platforms. However, as APIs…