Category: Mix

Hackerone logo
12
Sep
2024

The Rise of Bug Bounty Programs in S-1 Filings: A New Standard in Corporate Security

Learn more about bug bounty programs and how they work > The Growing Trend At HackerOne, we’ve observed a notable…

Burp Suite Performance Improvements | Blog
11
Sep
2024

Burp Suite Performance Improvements | Blog

Daniel Allen | 11 September 2024 at 06:53 UTC Performance is a critical factor in the usability and efficiency of…

Hackerone logo
11
Sep
2024

Announcing Hai Plays: Personalize Your Playbook for Spot-On Security Advice

Take Precision to the Next Level—Beyond Basic AI Efficiency and precision are critical in every operation. However, many security teams…

Hackerone logo
10
Sep
2024

Capital One Launches Public Bug Bounty Program with HackerOne

What’s New?  We at Capital One strongly believe in the importance of security, and part of our mission is to…

Hackerone logo
09
Sep
2024

From Prospect to Partner: Jon Stone Shares HackerOne Career Story

At HackerOne, SDRs focus on prospecting, qualifying leads, and setting up meetings for AEs, while developing these skills to take on…

My Current Favorite AI Prompt
09
Sep
2024

My Current Favorite AI Prompt

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; } .bh__table_cell { padding: 5px; background-color: #FFFFFF; } .bh__table_cell p { color:…

Hacking misconfigured AWS S3 buckets: A complete guide
06
Sep
2024

Hacking misconfigured AWS S3 buckets: A complete guide

AWS S3 (Simple Storage Service) buckets are a popular storage service used by software companies and organizations to store public…

Hackerone logo
05
Sep
2024

Quantifying the Value of Bug Bounty Programs: ROI, ROM, or Both?

HackerOne customers consistently factor in cost savings when measuring the success of their security engagements, with 59% valuing the estimated savings…

Hackerone logo
04
Sep
2024

Crushing FUD: Embracing Ethical Hackers to Strengthen Cybersecurity

What is FUD? Fear, Uncertainty, and Doubt (FUD), are central blockers to high-efficacy security programs by creating a climate of…

API Attack Surface: How to secure it and why it matters
04
Sep
2024

API Attack Surface: How to secure it and why it matters

Managing an organization’s attack surface is a complex problem involving asset discovery, vulnerability analysis, and continuous monitoring. There are multiple…

Hackerone logo
30
Aug
2024

HackerOne’s Commitment to Learning and Development

HackerOne is committed to providing comprehensive learning and development opportunities to fuel our competitive edge and cultivate a highly skilled…

Evolution of Attack Surface Management
30
Aug
2024

Evolution of Attack Surface Management

The Early Days: Basic Asset Management While it was not called ASM, the concept of managing attack surface management began…