Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

HackerOne

Below you will find reports with the source of “HackerOne”

image from The 2022 Attack Resistance Report

The 2022 Attack Resistance Report

Several trends in the way we work and consume technology have resulted in an ever-expanding cyberattack surface for organizations of all sizes. Comprehensive digital transformation across enterprises, the rise in cloud adoption, the normalization of working from anywhere, and Internet of Things (IoT) initiatives have resulted in an explosion of new applications, along with an increased rate of iterations and updates.

(more available)
Added: May 31, 2024
image from The State of Vulnerability Disclosure Policy (VDP) Usage in Global Consumer loT in 2022

The State of Vulnerability Disclosure Policy (VDP) Usage in Global Consumer loT in 2022

This is the fifth report in the series which plots the use of vulnerability disclosure in consumer markets with the introduction of enterprise starting in 2021. For consumers, knowing that a manufacturer has the requisite systems in place to receive, and remedy, known security flaws is a welcome form of assurance. Indeed, we have said many times that the lack of an easily identifiable method for reporting security issues could be likened to a canary in the coal mine – it’s a good health indicator as to how serious they are about security.

(more available)
Added: May 29, 2024
image from Hacker-Powered Security Report: Industry Insights '21

Hacker-Powered Security Report: Industry Insights '21

HackerOne’s Hacker-Powered Security Report: Industry Insights leverages data from real-world vulnerability reports to provide insight into the fastest-growing vulnerability categories, how bounty prices are changing year over year, and which industries are fastest to fix. The most innovative CISOs stay ahead of cybersecurity threats and mitigate vulnerabilities by augmenting internal teams and security testing tools with a skilled and engaged hacking community.

(more available)
Added: May 22, 2024
image from Hacker-Powered Security Report Financial Services Edition 2022

Hacker-Powered Security Report Financial Services Edition 2022

In this year’s Hacker-Powered Security Report: Financial Services, we look at what drives ethical hackers, where they focus their energies, and what they’re doing to help financial services companies improve their security profile. In the past year, the hacking community has found over 65,000 customer vulnerabilities. Financial services continues to be among the most popular industries for ethical hackers to work on, and vulnerabilities in web applications are by far the most commonly reported issues in the industry

(more available)
Added: May 21, 2024
image from Hacker Powered Security Report 2023

Hacker Powered Security Report 2023

The 7th annual Hacker-Powered Security Report goes deeper than ever before with customer insights, in addition to the opinions of some of the world’s top hackers. We also take a more comprehensive look at the top ten vulnerabilities and how various industries are performing when it comes to incentivizing hackers to find the vulnerabilities that are most important to them.

(more available)
Added: December 15, 2023
image from 4th Annual Hacker Powered Security Report

4th Annual Hacker Powered Security Report

This report goes into the hacking industry in 2020. It talks about the impact of hackers on security, bug bounty trends, and more.

(more available)
Added: October 8, 2020
image from The 2019 Hacker Report

The 2019 Hacker Report

The third annual report from Hacker One on the state of the hacker/security testing community. Data is drawn from Hacker One’s community of bug bounty registrants and subscribing platforms.

(more available)
Added: June 23, 2020
image from The 2020 Hacker Report

The 2020 Hacker Report

The fourth annual report from Hacker One on the state of the open security testing community, using data from Hacker One’s bug bounty program.

(more available)
Added: June 23, 2020
image from US Senate Subcomittee On Data Security And Bug Bounties

US Senate Subcomittee On Data Security And Bug Bounties

This is a transcript of a February 2018 US Senate meeting that discussed Data Security and the hacking community.

Added: October 21, 2018
image from The 2018 Hacker Report

The 2018 Hacker Report

This report is a kind of dossier on the hacker community. It lets you in to their world, to know their mindset, and thoughts on the bug bounty community.

(more available)
Added: October 20, 2018
image from The Hacker-Powered Security Report 2018

The Hacker-Powered Security Report 2018

As we approach critical mass of hacker-powered security, read on to learn more about best practices of starting and running effective disclosure and bug bounty programs, and get to know some of the stories and stats about the hackers themselves.

(more available)
Added: October 19, 2018
image from The Hacker-Powered Security Report 2017

The Hacker-Powered Security Report 2017

This report examines the broadest platform data set available and explains why organizations like General Motors, Starbucks, Uber, the U.S. Department of Defense, Lufthansa, and Nintendo have embraced continuous, hacker-powered security.

(more available)
Added: October 18, 2018
image from OWASP Top 10 2017 A Flash Card Guide

OWASP Top 10 2017 A Flash Card Guide

This is a fun little infographic that provides information on the top threats of 2017.

Added: October 17, 2018
© Cyentia Institute 2025
Library updated: June 20, 2025 08:08 UTC (build b1d7be4)