Hackerone logo
25
Jan
2025

Six Years of Proactive Defense: Deribit’s Journey with HackerOne

Q: Why did Deribit launch a bug bounty program? A: I like to view security as an onion where each…

Jane Devry
25
Jan
2025

Data Privacy and Security: Protecting Patient Data and Ensuring HIPAA Compliance

Data security is challenging enough when the goal is to prevent bad actors from gaining unauthorized access. But sometimes, other…

Jane Devry
25
Jan
2025

Streamlining Payment Processing for High-Risk Businesses in 2025

Payment processors need to constantly be on the edge of innovative technologies and tools, especially when high-risk businesses are concerned….

Hackerone logo
25
Jan
2025

Introducing the Wells Fargo Public Bug Bounty Program

Since then, we’ve grown the program, collaborated with HackerOne, and built partnerships within the bug bounty community. The valuable insights…

Jane Devry
25
Jan
2025

How Effective Data Center Security Starts at the Perimeter with Advanced Physical Security Solutions

Data is one of the most valuable resources in the world.  Despite its ubiquity in the digital age, companies are…

Hackerone logo
25
Jan
2025

How Crypto and Blockchain Organizations Manage Complex Attack Surfaces With Competitive Security Testing Programs

There are three factors that differentiate crypto and blockchain organizations from other industries; their attack surfaces, their most common vulnerabilities,…

Hackerone logo
25
Jan
2025

How a Privilege Escalation Led to Unrestricted Admin Account Creation in Shopify

In a privilege escalation attack, an attacker gains elevated rights, permissions, or entitlements beyond the intended level associated with their…

Hackerone logo
25
Jan
2025

New York Releases AI Cybersecurity Guidance: What You Need to Know

AI adoption is accelerating in the financial services industry, both as an asset for improving business operations and as a…

Hackerone logo
25
Jan
2025

Breaking Down the OWASP Top 10: Insecure Design

In the absence of these considerations, systems can be retrofitted with ineffective security controls or lack them entirely. This can…

Hackerone logo
25
Jan
2025

The OWASP Top 10 for LLMs 2025: How GenAI Risks Are Evolving

Here is HackerOne’s perspective on the Top 10 list for LLM vulnerabilities, how the list has changed, and what solutions…

Hackerone logo
25
Jan
2025

ROI Isn’t Cutting It: 6 Questions to Help CISOs Better Quantify Security Investments

However, in cybersecurity, quantifying net profit becomes significantly more complex due to the intangible nature of its benefits and the…

Hackerone logo
25
Jan
2025

A Partial Victory for AI Researchers

HackerOne has partnered with security and AI communities to advocate for stronger legal protections for independent researchers. Most recently, HackerOne…