Category: Mix

Hackerone logo
11
Apr
2024

How a Race Condition Vulnerability Could Cast Multiple Votes

Race condition vulnerabilities make up less than 0.3% of reports on the HackerOne platform. However, researchers have recently been particularly…

Hackerone logo
11
Apr
2024

HackerOne’s Digital First Workplace | HackerOne

This is an overview of the conversation and some of the best practices shared when creating a remote workplace. Listen…

Hackerone logo
11
Apr
2024

HackerOne Company Values Matter: Lead with Integrity

Each year, HackerOne employees nominate peers to receive the covetable Values Awards. Five Hackeronies are recognized for their unique contribution…

Hackerone logo
11
Apr
2024

How to Measure the Value of Pentesting [4 Metrics]

Effectiveness: Effectiveness measures the method’s ability to provide reliable and accurate vulnerability detections, comprehensive system coverage, compliance with standards, and…

Hackerone logo
11
Apr
2024

HackerOne Celebrates Global Work from Home Day

Flexibility Redefined One of the advantages of digital first work is the flexibility it offers employees. Our recent employee engagement…

Hackerone logo
09
Apr
2024

The Importance of Credential Rotations: Best Practices for Security and Data Protection

The Significance of Credential Rotations In today’s digital landscape, the significance of regular credential rotations cannot be overstated. Unfortunately, not…

Top 6 Data Breaches That Cost Millions
08
Apr
2024

Top 6 Data Breaches That Cost Millions

“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using…

Top 3 API Leaks Identified by Cybersecurity & InfoSec Experts
08
Apr
2024

Top 3 API Leaks Identified by Cybersecurity & InfoSec Experts

APIs (Application Programming Interfaces) have proliferated widely, which increases their susceptibility to various vulnerabilities. In the realm of web applications,…

Hackerone logo
04
Apr
2024

12 Questions to Answer Before Penteting

Diving into pentest readiness, this comprehensive preparation guide is adaptable to different types of pentest, regardless of the target’s size…

Hackerone logo
03
Apr
2024

Impacts and Securing Open Source

What Is XZ Utils and What Happened? XZ Utils is an open source software commonly found in most Linux distros,…

Building a case for bug bounty programs
03
Apr
2024

Building a case for bug bounty programs

Bug bounty programs have emerged as a powerful tool in the cybersecurity arsenal, empowering organizations to proactively identify and resolve…

Hackerone logo
29
Mar
2024

HackerOne Company Values Matter: Respect All People

At HackerOne, our company values – Default to Disclosure, Respect All People, Win as a Team, Lead with Integrity, and…