Category: Mix

Hackerone logo
10
Sep
2024

Capital One Launches Public Bug Bounty Program with HackerOne

What’s New?  We at Capital One strongly believe in the importance of security, and part of our mission is to…

Hackerone logo
09
Sep
2024

From Prospect to Partner: Jon Stone Shares HackerOne Career Story

At HackerOne, SDRs focus on prospecting, qualifying leads, and setting up meetings for AEs, while developing these skills to take on…

My Current Favorite AI Prompt
09
Sep
2024

My Current Favorite AI Prompt

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; } .bh__table_cell { padding: 5px; background-color: #FFFFFF; } .bh__table_cell p { color:…

Hacking misconfigured AWS S3 buckets: A complete guide
06
Sep
2024

Hacking misconfigured AWS S3 buckets: A complete guide

AWS S3 (Simple Storage Service) buckets are a popular storage service used by software companies and organizations to store public…

Hackerone logo
05
Sep
2024

Quantifying the Value of Bug Bounty Programs: ROI, ROM, or Both?

HackerOne customers consistently factor in cost savings when measuring the success of their security engagements, with 59% valuing the estimated savings…

Hackerone logo
04
Sep
2024

Crushing FUD: Embracing Ethical Hackers to Strengthen Cybersecurity

What is FUD? Fear, Uncertainty, and Doubt (FUD), are central blockers to high-efficacy security programs by creating a climate of…

API Attack Surface: How to secure it and why it matters
04
Sep
2024

API Attack Surface: How to secure it and why it matters

Managing an organization’s attack surface is a complex problem involving asset discovery, vulnerability analysis, and continuous monitoring. There are multiple…

Hackerone logo
30
Aug
2024

HackerOne’s Commitment to Learning and Development

HackerOne is committed to providing comprehensive learning and development opportunities to fuel our competitive edge and cultivate a highly skilled…

Evolution of Attack Surface Management
30
Aug
2024

Evolution of Attack Surface Management

The Early Days: Basic Asset Management While it was not called ASM, the concept of managing attack surface management began…

Hackerone logo
30
Aug
2024

How Hai Facilitates Clear and Effective Communication

The Communication Challenge in Cybersecurity The vulnerability management process involves various stakeholders, each with their own expertise and communication styles….

Hackerone logo
30
Aug
2024

Pentesting for iOS Mobile Applications

Pentest reports are a requirement for many security compliance certifications (such as GDPR and HIPAA), and having regular pentest reports on hand can…

Every AI Talk from DEF CON 2024
28
Aug
2024

Every AI Talk from DEF CON 2024

We will begin with an overview of event analysis systems and their challenges. Participants will learn about different types of…