How to build an incident response plan
Hardly a day goes by without news of another hack making the headlines and the hours and days following a security breach can make or…
Hardly a day goes by without news of another hack making the headlines and the hours and days following a security breach can make or…
The Federal Bureau of Investigation (FBI) continues to disrupt the world’s largest shadow eBook library, Z-Library, by seizing more domains used by the platform. Besides…
We’re pleased to announce some enhancements to how Reputation, Signal, and Impact are calculated. These changes will be applied going forward (not applied retroactively) and…
Let’s clear the air first. All websites are hackable. So how often are you conducting a security check on your web applications? Sometimes you can…
This week’s ransomware news has been dominated by a Royal ransomware attack on the City of Dallas that took down part of the IT infrastructure.…
Canadian diversified software company Constellation Software confirmed on Thursday that some of its systems were breached by threat actors who also stole personal information and…
When you transfer data from an Android to an iOS device, the Move to an iOS app is the go-to solution for any mobile user.…
This year, the Juneteenth holiday gained wider global recognition. At HackerOne, we kicked off our inaugural Juneteenth celebration with a day of learning, reflection and unified…
A new Android malware called ‘FluHorse’ has been discovered, targeting users in Eastern Asia with malicious apps that imitate legitimate versions. The malware was discovered…
Android security updates released this month patch a high-severity vulnerability exploited as a zero-day to install commercial spyware on compromised devices. The security flaw (tracked…
In a declaration in federal court in 2021, Quentin Van Meter, the president of the American College of Pediatricians, described the organization as a “secular,…
Penetration testing is a good baseline for evaluating system vulnerabilities and an industry best practice that supports routine security hygiene. Many companies also use traditional…