Category: Mix

Hackerone logo
28
Jan
2025

Salesforce Teams Up With All-Star Hackers at H1-4420

“With help from hackers, Salesforce can consistently put its products and systems to the test, as well as boost security…

Hackerone logo
28
Jan
2025

5 Common Mistakes When Running a Bug Bounty Program (and Solutions)

1. Unprepared to Manage Incoming Vulnerability Reports Naturally, the purpose of running a bug bounty program is to identify vulnerabilities…

Hackerone logo
28
Jan
2025

Bug Bounty Vs. Pentest [Differences Explained]

What Is Pentesting? Pentesting attempts to ethically breach a system’s security for the purpose of vulnerability identification. In most cases,…

A complete guide to finding SSRF vulnerabilities in PDF generators
28
Jan
2025

A complete guide to finding SSRF vulnerabilities in PDF generators

PDF generators are commonly implemented in applications. Developers tend to use these components to generate documents based on dynamic data…

Hackerone logo
28
Jan
2025

How HackerOne Reinvented Security for Developers

Workflow Integration Code security tools need to be accessible in the toolkit developers already use and in the workflows they…

Hackerone logo
28
Jan
2025

2024 Cybersecurity Budget Planning: Budgeting for VDPs

New and Upcoming Public Policy on VDPs VDPs are in the midst of a shift from an industry best practice…

The complexities of scaling AppSec teams and how to address them in 2025 | Blog
28
Jan
2025

The complexities of scaling AppSec teams and how to address them in 2025 | Blog

Tom Ryder | 28 January 2025 at 13:08 UTC Your organization’s application portfolio is growing and so are the risks….

Hackerone logo
28
Jan
2025

Severity Does Not Mean Priority

Automated scanners and tools are noisy; they do not know your business and can’t extrapolate context to truly understand validity…

Hackerone logo
28
Jan
2025

Meet the Talent Strategy Team

Our understanding of leadership and employee needs and the ability to build learning and development content made it easier for…

Hackerone logo
28
Jan
2025

How to Fortify Your Assets & Maintain Compliance

Stepped-up SEC Enforcement Makes Proactive Security a Must The SEC’s finalized cybersecurity rules, effective starting mid-December 2023, place a spotlight…

Hackerone logo
28
Jan
2025

Implementing Zero Trust Security With a VDP

I understand the importance of Zero Trust but, personally, I’ve had a hard time bridging the gap between how the…

Hackerone logo
28
Jan
2025

Celebrating the Inaugural Glass Firewall Conference

This event’s focus was getting more women to participate in bug bounty programs, as we noticed the community is relatively…