A Partial Victory for AI Researchers
HackerOne Blog
by Ilona Cohen
4d ago
What is the Digital Millennium Copyright Act and what are the implications of its recent ruling for AI researchers ..read more
Visit website
ROI Isn’t Cutting It: 6 Questions to Help CISOs Better Quantify Security Investments
HackerOne Blog
by Naz Bozdemir
1w ago
Why ROI is not the most effective method to quantify cybersecurity investments — and how ROM can help ..read more
Visit website
The OWASP Top 10 for LLMs 2025: How GenAI Risks Are Evolving
HackerOne Blog
by Manjesh S.
1w ago
The new OWASP Top 10 for LLMs is here. How has it changed, and how can organizations prevent GenAI risks ..read more
Visit website
Breaking Down the OWASP Top 10: Insecure Design
HackerOne Blog
by Andrew Pratt
1M ago
Learn about the different types of insecure design vulnerabilities and how to identify them ..read more
Visit website
New York Releases AI Cybersecurity Guidance: What You Need to Know
HackerOne Blog
by Ilona Cohen
1M ago
What does New York's new AI Cybersecurity Guidance mean for financial institutions and other regulated companies ..read more
Visit website
Azure Cloud Configuration Review
HackerOne Blog
by Paul De Baldo V
1M ago
Learn the testing methodologies and security best practices for Azure Cloud Configuration Review ..read more
Visit website
How a Privilege Escalation Led to Unrestricted Admin Account Creation in Shopify
HackerOne Blog
by Andrew Pratt
1M ago
This Shopify privilege escalation vulnerability could have resulted in the creation of unrestricted admin accounts ..read more
Visit website
How Crypto and Blockchain Organizations Manage Complex Attack Surfaces With Competitive Security Testing Programs
HackerOne Blog
by HackerOne
1M ago
What makes securing crypto and blockchain organizations so different than other industries? Let's look at the data ..read more
Visit website
Introducing the Wells Fargo Public Bug Bounty Program
HackerOne Blog
by HackerOne
1M ago
Wells Fargo announces its public bug bounty program after several years of engaging the HackerOne community ..read more
Visit website
Six Years of Proactive Defense: Deribit’s Journey with HackerOne
HackerOne Blog
by HackerOne
1M ago
Learn how Deribit uses its HackerOne bug bounty program for its proactive security strategy ..read more
Visit website

Follow HackerOne Blog on FeedSpot

Continue with Google
Continue with Apple
OR