<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xml:base="https://www.hackerone.com/">
  <channel>
    <title>Application Security</title>
    <link>https://www.hackerone.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>How HackerOne Reinvented Security for Developers</title>
  <link>https://www.hackerone.com/blog/how-hackerone-reinvented-security-developers</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">How HackerOne Reinvented Security for Developers</span>
    



    
        Dan Mateer
        
            Senior Director, Delivery Excellence
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Mon, 01/27/2025 - 08:27
</span>

            
  
      
  
    Image
                



          

  

      
            January 27th, 2025

      
            <h2>Workflow Integration</h2><p dir="ltr">Code security tools need to be accessible in the toolkit developers already use and in the workflows they already know. Git pull/merge requests, the standard for peer review validation, were the ideal areas to introduce the interface. Here, every way a user can access and interact with the platform is end-to-end native. If an engineer has experience with peer code review, they already know how to use it.</p><p dir="ltr">The experience is consistent across code repository providers - whether cloud-hosted or on-premise. It works just as well for a cloud-hosted GitHub repository as it does for a self-hosted Azure DevOps repository.</p><h2>Validation for Deterministic Warnings</h2><p dir="ltr">Noise from security scanners fosters a distrust-by-default relationship and leads to over-scrutinization of true positives. To rebuild developer trust, scanners need to be consistently right.</p><p dir="ltr">Knowing this, we built a Code Security Engine combining&nbsp;<a href="https://www.hackerone.com/press-release/hackerone-and-semgrep-partner-streamline-code-review-modern-development">some of the best scanning tools</a> (SAST, SCA, IaC, Secrets) working in tandem with a Context Engine - leveraging AI to assess the relevance and accuracy of their outputs - to enumerate and prioritize warnings for HITL validation.&nbsp;</p>

<em>In most cases, less than 25% of security scanner warnings are true positives or warrant action. Low-likelihood “noise” is flagged by HackerOne AI’s (</em><a href="https://www.hackerone.com/ai"><em>Hai</em></a><em>) Context Engine model and confirmed by HITL validation to filter false-positives and prevent false-negatives.</em>



<em>AI-generated analysis of code changes used in HITL validation for understanding architectural implications.</em>

<p dir="ltr">After validation, all findings are presented with remediation guidance from an experienced engineer who manually reviewed them, so they’re surfaced with contextual understanding, prescriptive next steps, and an actual person who can help.</p><p dir="ltr">This multi-layered filtering ensures the controls that interact with developers activate only when it’s important, actionable, and with remediation support.</p>

<em>A security risk flagged by a code security scanner validated by an expert with an additional insight and guidance in a “Remediation” section.</em>

<h2>Validation for Non-Deterministic Risks</h2><p dir="ltr">In parallel, to catch flaws at greater architectural depths, our Hai Hotspots model traverses the changes and repositories. Designed to mimic how a human engineer would navigate a codebase for security flaws, it poses unexpected scenarios with risk implications and then analyzes reachability with indexing techniques that use symbol definitions and references to learn implementation.</p><p dir="ltr">The power of this technology is its non-deterministic output - which is weakly actionable if sent to a developer tasked with&nbsp;<em>remediation</em>, but highly actionable for&nbsp;<em>review</em> and&nbsp;<em>investigation</em>.</p>

<em>AI-generated security hotspot warning presented to experts reviewing proposed code changes during HITL validation.</em>

<p dir="ltr">This is where HITL validation is critical—the output is meticulously reviewed manually by an expert within the context of the entire codebase and with a powerful set of tools. If confirmed, it’s sent to developers in the form of actionable next steps.</p><h3><br><br>Feedback Loops That Listen and Learn</h3><p dir="ltr">What if a security risk can’t be confirmed with 100% confidence? Are there multiple approaches to remediation?</p><p dir="ltr">HITL validation introduces an expert qualified for these discussions.&nbsp;<a href="https://docs.github.com/en/pull-requests/collaborating-with-pull-requests/proposing-changes-to-your-work-with-pull-requests/about-pull-requests" target="_blank">This is what pull/merge requests are for</a>. Experts are assigned to proposed changes for the remainder of the pull/merge request lifecycle so anything learned from discussions is retained—creating a smart, adaptive exception management process without slowing developers down.</p>

<em>AI with HITL validation enables discussion at the pull/merge request code review phase - an existing and well-established SDLC step designed for collaboration on proposed changes.</em>

<h2>The Human-in-the-loop Experience</h2><p dir="ltr">Our most advanced web application is one our customers never need to see: the platform where&nbsp;<a href="https://www.pullrequest.com/reviewers/" target="_blank">our network of experts</a> analyze engine outputs and manually review code.</p><p dir="ltr">When a threshold of risk is detected, output is populated in a specialized first-of-its-kind code review platform with the familiarity of an integrated development environment (IDE) to conduct validation.&nbsp;</p><p dir="ltr">A lot needs to be known quickly. Analysis of the code is visually sequenced based on priority focus areas with cognitive load awareness. They know what was changed and why and access areas&nbsp;<em>unchanged</em>&nbsp;to gain full context.</p>

<em>Tooling for HITL validation on HackerOne PullRequest.</em>

<h2>What Does it Look Like?</h2><p dir="ltr">When proposed changes are analyzed and determined not to contain security risks, developers are informed quickly in built-in pipeline checks—usually completing&nbsp;<strong>within</strong>&nbsp;<strong>2 minutes</strong>.</p>

<em>Lifecycle of security analysis where changes do not contain security risks.</em>



<em>Results from Scanning Engine and Hai Hotspots model as pipeline check.</em>

<p dir="ltr">When changes contain possible security risks that need review, they’re triaged for non-blocking human expert review. Validation is usually completed&nbsp;<strong>within 90 minutes</strong>.</p>

<em>Lifecycle of security risk analysis with HITL validation.</em>



<em>Results of HITL validation visible to developers as interactive peer code review commentary.</em>

<h2>Conclusion</h2><p dir="ltr">Security controls that interface directly with developers need to understand how developers work. They need to be&nbsp;<a href="https://www.hackerone.com/vulnerability-management/resurrecting-shift-left-human-in-the-loop-ai">actionable, non-blocking, and include remediation as part of the solution</a>.&nbsp;<a href="https://www.hackerone.com/product/pull-request">HackerOne PullRequest</a> makes this possible because of all that happens behind the scenes. By combining human expertise with thoughtfully deployed AI models and agents, the platform can learn context, provide feedback, filter SAST and SCA warnings, find vulnerabilities, and help developers fix them all within the workflows they already use and without sacrificing velocity.</p>
      

            
            <a href="https://www.hackerone.com/blog/topic/application-security" hreflang="en">Application Security</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-management" hreflang="en">Vulnerability Management</a>
        
    

            <p dir="ltr">Our mission to create a solution to mend the rift between security and development with AI&nbsp;<a href="https://www.hackerone.com/press-release/hackerone-acquires-pullrequest-power-developer-first-security-testing-solutions">began in 2022</a>. We prioritized a human-in-the-loop (HITL) validation methodology based not just on our commitment to responsible use of models, but on a thesis that reducing the methodology to binary categorization is a misuse of its potential. A human expert can confirm output as “right” or “wrong,” and then enrich output that’s “right” to be smarter and actionable.</p><p dir="ltr">We were right. When these principles are applied, application security controls can not only be compatible with development, but loved by developers.</p>
      ]]></description>
  <pubDate>Mon, 27 Jan 2025 14:27:01 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5469 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Pentesting for iOS Mobile Applications</title>
  <link>https://www.hackerone.com/blog/pentesting-ios-mobile-applications</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Pentesting for iOS Mobile Applications</span>
    



    
        Paul De
        
            Technical Engagement Manager
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Thu, 08/29/2024 - 13:30
</span>

            
  
      
  
    Image
                



          

  

      
            August 29th, 2024

      
            <p dir="ltr">Pentest reports are a requirement for many security compliance certifications (such as&nbsp;<a href="https://www.hackerone.com/security-compliance/gdpr-pentesting">GDPR&nbsp;</a>and&nbsp;<a href="https://www.hackerone.com/security-compliance/hipaa-pentesting">HIPAA</a>), and having regular pentest reports on hand can also signal to high-value customers that you care about the security of your mobile applications, boosting customer trust and brand loyalty.</p><p dir="ltr">In this blog, we’ll cover some of the most important aspects of pentesting for iOS mobile applications. Jump to a topic using the links below:</p><ul><li dir="ltr"><a href="#methodologies">iOS Testing Methodologies</a></li><li dir="ltr"><a href="#vulnerabilities">Common iOS Vulnerabilities</a></li><li dir="ltr"><a href="#practices">iOS Pentesting Best Practices</a></li><li dir="ltr"><a href="#doorbell">Case Study: Doorbell Camera App Leaks User Location</a></li></ul><h2 id="methodologies">iOS Testing Methodologies</h2><p dir="ltr">HackerOne's iOS testing methodologies are informed by established standards such as the&nbsp;<a href="https://pentest-standard.readthedocs.io/en/latest/" target="_blank">PTES</a>,&nbsp;<a href="https://owasp.org/www-project-mobile-top-10/" target="_blank">OWASP Mobile Top 10</a>, and the OWASP Mobile Application Security Testing Guide (<a href="https://mas.owasp.org/MASTG/" target="_blank">MASTG</a>). Additionally, our testing processes adhere to the standards required for&nbsp;<a href="https://www.hackerone.com/security-compliance/crest-pentesting">CREST</a> certification/accreditation, ensuring comprehensive and reliable assessments across various application types, including mobile applications.</p><p dir="ltr">Our methodology is continuously evolving to ensure comprehensive coverage for each pentesting engagement. This approach stems from:</p><ul><li dir="ltr">Consultations with both internal and external industry experts.</li><li dir="ltr">Leveraging and adhering to recognized industry standards.</li><li dir="ltr">Incorporating feedback and insights from our pentesters, who bring valuable experience from their full-time roles outside of HackerOne, enabling us to deliver highly technical, in-depth testing.</li><li dir="ltr">Gleaning insights from a vast array of global customer programs, spanning both time-bound and ongoing engagements.</li><li dir="ltr">Detailed analysis of millions of vulnerability reports we receive through our platform (see the&nbsp;<a href="https://hackerone.com/hacktivity/overview">Hacktivity page</a> for details).</li></ul><p dir="ltr">Threats are constantly evolving, so our methodology can't remain stagnant. HackerOne’s Delivery team, including experienced<a href="https://docs.hackerone.com/en/articles/8541431-your-pentest-team"> Technical Engagement Managers</a> (TEMs), constantly refine and adapt based on feedback and real-world experiences, delivering unparalleled security assurance.</p><h2 id="vulnerabilities">Common iOS Vulnerabilities</h2><h3>Improper Credential Usage</h3><p dir="ltr"><a href="https://www.hackerone.com/engineering/credentials-rotation">Improper credential usage</a> is very common in mobile applications, particularly those with backend APIs or databases that require authentication. This often results in credentials being hardcoded within the application. Improper credential usage also includes the insecure transmission of authentication materials, such as the lack of TLS encryption during transit, and the insecure storage of user credentials, such as failing to use the iOS sandbox model to secure data access against other apps.</p><p dir="ltr">For example, hardcoded API keys like AWS access keys or Google Maps API keys can be easily extracted from the application package. An attacker who obtains these keys could interact with backend services, potentially exposing sensitive data about other users, initiating unauthorized transactions, or even compromising the organization’s cloud infrastructure. If an AWS key is exposed, the attacker could gain access to cloud resources, modify configurations, or extract critical data, leading to significant financial and reputational damage.</p><p dir="ltr">Additionally, some applications store sensitive information, like OAuth tokens or user credentials, in insecure storage areas such as plain text files or unprotected databases. Mobile malware can exploit these weaknesses to harvest credentials, allowing attackers to impersonate users or gain unauthorized access to private information, leading to data breaches or identity theft.</p><p dir="ltr">Testing for improper credential usage is straightforward and typically involves scanning extracted application files for secrets, analyzing the source code for where credentials are transmitted or stored, and checking for the use of secure channels like TLS. This vulnerability is particularly prevalent in untested applications, where significant credential misuse is often uncovered during the first test. The discovery of hardcoded credentials, insecure storage practices, and unencrypted transmission underscores the critical importance of regular pentesting for mobile applications.</p><h3>Insecure Authentication or Authorization</h3><p dir="ltr">Mobile applications often serve as a front end for APIs and web services, making insecure authentication or authorization issues prevalent. If a mobile app acts as an authorized agent to query backend data without proper security, an attacker could mimic this interaction to access sensitive data or execute actions anonymously. This risk increases when the associated API is also in scope, as vulnerabilities in the API can directly affect the mobile app's security.</p><p dir="ltr">Third-party authentication mechanisms, like signing in with Apple ID or social media accounts, introduce additional attack surfaces, particularly in account creation and recovery flows. For example, flaws in OAuth implementation or token validation could allow unauthorized access.</p><p dir="ltr">Mobile apps may also include local authentication methods, such as user-specified PINs or passwords. Vulnerabilities in-app logic or misuse of iOS native APIs could lead to bypassing these protections. Ensuring both local and remote access controls are tested and secured is crucial.</p><h3>Inadequate Privacy Controls</h3><p dir="ltr">Getting privacy rights is important, but even more so on mobile applications, as mobile devices contain a lot of Personally Identifiable Information (PII). Operating systems like iOS place a strong emphasis on privacy, constantly updating their <a href="https://www.apple.com/au/privacy/control/" target="_blank">controls</a> to ensure that data access is granted only with explicit user consent. If your application isn’t tested for compliance with legal privacy regulations like GDPR, CCPA, or emerging laws such as India’s Digital Personal Data Protection Act (<a href="https://www.globalprivacyblog.com/2023/12/indias-digital-personal-data-protection-act-2023-vs-the-gdpr-a-comparison/" target="_blank">DPDPA</a>), it could face regulatory penalties or struggle to access the data necessary for its functionality.</p><p dir="ltr">Inadequate privacy controls can also intersect with other vulnerabilities, such as insecure authentication or authorization, or improper storage of credentials. For example, if broken access controls in the backend API allow a user to access another user’s sensitive data, or if sensitive data is improperly cached on the device, it could lead to a serious data breach. Such incidents not only violate privacy regulations but can also severely damage an organization’s reputation.</p><p dir="ltr">We've seen reports of specific privacy-impacting vulnerabilities, including improper handling of OAuth tokens, lack of encryption for sensitive data stored on devices, and insufficient user consent mechanisms for accessing personal data. Addressing privacy control issues requires expert knowledge of mobile operating systems, application data handling, privacy policies, and relevant regulatory frameworks. Testing for these issues is crucial to ensure compliance and protect user data.</p><h2 id="practices">iOS Best Practices</h2><h3>Careful Scoping</h3><p dir="ltr">Having the right scope is crucial to a successful pentest—what is being tested can be just as important as how it is done. Modern iOS applications can be complex, with various features, frameworks, APIs, and integrations.</p><p dir="ltr">With limited time and resources for each pentest, selecting critical targets within the iOS application can make the difference between a low-value report and a successful pentest with high-impact findings. For instance, focusing on testing complex authentication mechanisms, data storage, inter-app communication, and the APIs that the iOS app interfaces with can yield more significant results than testing superficial UI elements. HackerOne evaluates your assets to accurately determine the needed pentest size and provides a customized quote tailored to your specific pentest requirements.</p><p dir="ltr"><em><strong>Read the Pre-Pentest Checklist Series&nbsp;</strong></em><a href="https://www.hackerone.com/penetration-testing/pre-pentest-checklist-part1"><em><strong>Part 1</strong></em></a><em><strong> and&nbsp;</strong></em><a href="https://www.hackerone.com/penetration-testing/pre-pentest-checklist-part2"><em><strong>Part 2&nbsp;to address crucial questions before your next pentest</strong></em></a><em><strong>.</strong></em></p><h3>Skills-Based Tester Matching</h3><p dir="ltr">Traditional consultancies often rely on in-house pentesters with general skills. However, iOS pentesting requires specialized knowledge of iOS architecture, Swift/Objective-C coding, and mobile security practices, which many firms lack.</p><p dir="ltr">With HackerOne Pentest, delivered via a Pentest as a Service (PTaaS) model, customers gain access to a diverse pool of elite, vetted security researchers who bring a wide range of skills, certifications, and experience. The HackerOne platform keeps track of each researcher's skill set based on their track record and matches the most suitable researchers for each engagement. The community-driven PTaaS approach delivers comprehensive coverage, versatility, and&nbsp;<a href="https://www.hackerone.com/penetration-testing/modern-pentesting-effectiveness">the highest-quality results&nbsp;</a>tailored to the types of assets and technology stacks of your mobile applications.&nbsp;&nbsp;</p><h2 id="doorbell">Case Study: Doorbell Camera App Leaks User Location</h2><p dir="ltr">Amazon's Ring Neighbours app allows users to publicly share Ring camera feeds online. In 2021, the organization had a data breach that<a href="https://techcrunch.com/2021/01/14/ring-neighbors-exposed-locations-addresses/" target="_blank"> leaked the precise location and home address</a> of its users. Although the precise location was not visible in the application, the underlying API responses of the users' posts leaked the longitude, latitude and home addresses of users who posted through the app. Even though not all posts were displayed to the user, the ID number of each post was incremental — meaning that an attacker could query the same API for all existing posts by changing the post number, and get more sensitive data. At the time, there were about 4 million posts in total - that's a lot of home addresses.</p><p dir="ltr">Inspecting and manipulating API requests is often the first or second step taken in a mobile application pentest, meaning that given a thorough pentest of this mobile application, the vulnerability would've easily been found and the data breach avoided. Privacy issues like these have been found and disclosed on HackerOne's programs, such as when Nextcloud's mobile application leaked&nbsp;<a href="https://hackerone.com/reports/1167919">file search records to the server during a local search</a>, or the&nbsp;<a href="https://hackerone.com/reports/781238">lack of anonymization of analytics data</a> on the Nord VPN app.&nbsp;</p><p dir="ltr">Both of those reports demonstrated that the researcher had an in-depth understanding of the application's data and privacy model, and hackers like them will be pentesting iOS applications for your organization.</p><h2 id="why">Why HackerOne is the Best Option for iOS Pentests</h2><p dir="ltr">By choosing HackerOne as your partner in pentesting, your organization can fully benefit from the <a href="https://www.hackerone.com/product/pentest">community-driven PTaaS model</a>. The HackerOne Platform simplifies pentest requests, asset onboarding, and researcher enlistment, making the process swift and efficient.&nbsp;</p><p dir="ltr">Our community of iOS experts brings deep knowledge of Apple's ecosystem, Swift, Objective-C, and the iOS platform, providing comprehensive coverage of&nbsp;<a href="https://owasp.org/www-project-mobile-top-10/" target="_blank">OWASP Mobile Top 10</a> risks and additional concerns like app extension vulnerabilities and iCloud data syncing issues. Utilizing advanced tools such as Frida and Objection, manual testing techniques, and custom scripts, HackerOne Pentests simulate real-world attack scenarios going beyond automated scans.&nbsp;</p><p dir="ltr">HackerOne's pentest reports help executives and cybersecurity engineers harden iOS apps against breaches that could lead to fines or penalties under GDPR and CCPA. Our iOS pentests offer critical protection in an evolving threat landscape by providing guidance on implementing Apple's latest security features. With the rapid setup, effective assessments, and prompt retesting, HackerOne supports organizations in reducing breach risks and helping fulfill compliance.</p><p dir="ltr">With the right blend of crowdsourced security, technical expertise, and technology, HackerOne is the ideal choice for your iOS mobile application pentests. To learn more or get started on your first pentest with HackerOne, <a href="https://www.hackerone.com/contact">contact our team of experts today.</a></p>
      

            
            <a href="https://www.hackerone.com/blog/topic/application-security" hreflang="en">Application Security</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/penetration-testing" hreflang="en">Penetration Testing</a>
        
    

            <p dir="ltr">From private messaging to mobile banking, billions of people around the world rely on iOS applications to provide real-time access to services while protecting their most sensitive data — data highly sought after by attackers. To safeguard these applications, HackerOne offers a methodology-driven penetration testing (pentesting) solution delivered via a Pentest as a Service (PTaaS) model. This approach connects organizations with&nbsp;<a href="https://docs.hackerone.com/en/articles/8538639-pentester-selection-and-vetting-process">a heavily vetted cohort of a global ethical hacker community</a> for comprehensive, end-to-end pentesting. Frequently performing dedicated pentesting, using a community-driven PTaaS is crucial to finding vulnerabilities in your mobile applications and quickly remediating them to reduce risk.</p>
      ]]></description>
  <pubDate>Thu, 29 Aug 2024 18:30:11 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5413 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>A Visual Guide to Bug Bounty Success </title>
  <link>https://www.hackerone.com/blog/visual-guide-bug-bounty-success</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">A Visual Guide to Bug Bounty Success </span>
    



    
        H1 Team
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Wed, 05/10/2017 - 23:05
</span>

            
  
      
  
    Image
                



          

  

      
            August 7th, 2024

      
            <p class="text-align-center"><strong>Click the image to download the Visual Guide to Bug Bounty Success</strong></p><a href="https://ma.hacker.one/rs/168-NAU-732/images/visualized-guide-to-bug-bounty-success-bbbfm_V4%20%281%29.pdf">&nbsp;</a><h2 dir="ltr"><span>START HERE</span></h2><h3 dir="ltr"><span>SETUP</span></h3><h4 dir="ltr"><span>Hone Your Vulnerability Management and Scoring Process</span></h4><p dir="ltr"><span>Finetune your vulnerability management process, which scoring system you use, and document how bug bounty reports fit in.</span></p><p dir="ltr"><a href="https://www.hackerone.com/vulnerability-management/common-bug-bounty-program-mistakes"><em><span>Learn about severity scoring &gt;</span></em></a></p><h4 dir="ltr"><span>Prepare Your Support Team</span></h4><p dir="ltr"><span>Your Bug Bounty Leader should determine your on-duty support rotation and sort out your triage team for the most efficient remediation.</span></p><p dir="ltr"><a href="https://www.hackerone.com/hackerones-depth-approach-vulnerability-triage-and-validation"><em><span>Learn about HackerOne triage &gt;</span></em></a></p><h4 dir="ltr"><span>Assess Your Budget</span></h4><p dir="ltr"><span>Use bounty benchmarking data to secure the appropriate budget, price bounties effectively, and manage your budget efficiently.</span></p><p dir="ltr"><a href="https://www.hackerone.com/vulnerability-management/bug-bounty-budget-efficiency"><em><span>How to set an efficient bug bounty budget &gt;</span></em></a></p><h4 dir="ltr"><span>Communicate Your Response Targets</span></h4><p dir="ltr"><span>Set expectations for hackers on your security page for bounty payments by severity, time to triage, time to bounty, and time to remediation.&nbsp;</span></p><h4 dir="ltr"><span>Update Your Security Page</span></h4><p dir="ltr"><span>The “front door” for hackers to any bug bounty program is the security page. Be transparent about what policies, scopes, and standards hackers should expect from your program.&nbsp;</span></p><p dir="ltr"><a href="https://www.hackerone.com/security-page-updates"><em><span>See security page best practices &gt;</span></em></a></p><h4 dir="ltr"><span>Champion Internally</span></h4><p dir="ltr"><span>Security leaders can showcase the value of a robust bug bounty program by emphasizing the ROI of staying secure in comparison to the cost of a breach.</span></p><p dir="ltr"><a href="https://www.hackerone.com/customer-stories/get-the-most-from-hackers"><em><span>How&nbsp;</span></em></a><a href="https://www.hackerone.com/customer-stories/securing-organizational-buy-in"><em><span>customers secure bug bounty buy-in &gt;</span></em></a></p><h3 dir="ltr"><span>OPERATE</span></h3><h4 dir="ltr"><span>Refine Your Scope</span></h4><p dir="ltr"><span>As new assets are deployed or updated (e.g. websites, IoT devices, Mobile apps), refine your bug bounty scope for timely and continuous testing based on your industry and security goals.</span></p><h4 dir="ltr"><span>Get the Right Hackers</span></h4><p dir="ltr"><span>Invite the right number and skillsets of hackers to your private program — and call in the HackerOne Triage experts to help with incoming reports.&nbsp;</span></p><p dir="ltr"><em><span>H</span><span>ow customers get the best hacker results &gt;</span></em></p><h4 dir="ltr"><span>Reward Your Hackers</span></h4><p dir="ltr"><span>Set your payment scale according to appropriate severity standards, and HackerOne facilitates the entire transaction for bounty payouts.&nbsp;&nbsp;</span></p><p dir="ltr"><a href="https://www.hackerone.com/customer-stories/get-the-most-from-hackers"><em><span>How&nbsp;customers get the best hacker results &gt;</span></em></a></p><h4 dir="ltr"><span>Measure Success</span></h4><p dir="ltr"><span>Bug bounty success is different for every program and organization, but by setting clear KPIs and sticking to them, you can effectively measure the success of your program and present the ROI to stakeholders.</span></p><p dir="ltr"><a href="https://www.hackerone.com/blogs-hackerones-ceo/prove-your-worth-how-measure-cybersecurity-roi-and-impress-your-board"><em><span>How customers measure bug bounty ROI &gt;</span></em></a></p><h3 dir="ltr"><span>EVALUATE</span></h3><h4 dir="ltr"><span>Scale Your program</span></h4><p dir="ltr"><span>More hackers + more scope + increased bounties = bigger, badder bugs. Work with HackerOne to determine the right time to add more assets into scope or take your private bug bounty program public.</span></p><p dir="ltr"><a href="https://www.hackerone.com/resources/customer-story/mercado-libres-journey-to-a-public-bug-bounty-program"><em><span>Mercado Libre’s journey to a public program &gt;</span></em></a></p><h4 dir="ltr"><span>Be Creative and Test</span></h4><p dir="ltr"><span>Make your bug bounty program exciting for researchers by participating in live hacking events, gamifying vulnerability discoveries, or matching bounty donations to charity.&nbsp;</span></p><p dir="ltr"><a href="https://www.hackerone.com/customer-stories/10-years-github-security-bug-bounty-program"><em><span>How GitHub kept hackers engaged for 10 years of bug bounty &gt;</span></em></a></p>
      

            
            <a href="https://www.hackerone.com/blog/topic/application-security" hreflang="en">Application Security</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-management" hreflang="en">Vulnerability Management</a>
        
    

            <p>While bug bounty success looks different for every program and organization, there are a number of key steps in planning, operating, and evaluating your program that will help ensure you achieve your security goals.</p>
      ]]></description>
  <pubDate>Thu, 11 May 2017 04:05:03 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">4644 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Pentesting for Web Applications</title>
  <link>https://www.hackerone.com/blog/pentesting-web-applications</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Pentesting for Web Applications</span>
    



    
        HackerOne Pentest
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Wed, 07/10/2024 - 12:47
</span>

            
  
      
  
    Image
                



          

  

      
            July 10th, 2024

      
            <p dir="ltr">Pentest reports are a requirement for many security compliance certifications (such as&nbsp;<a href="https://www.hackerone.com/security-compliance/iso-27001-pentesting">ISO 27001</a> and&nbsp;<a href="https://www.hackerone.com/security-compliance/soc-2-pentesting">SOC 2</a>), and having regular pentest reports on hand can also signal to high-value customers that you care about the security of your web applications, boosting customer trust and brand loyalty.</p><p dir="ltr">Jump to a topic using the links below:</p><ul><li><p dir="ltr"><a href="#methodologies">Testing Methodologies</a></p></li><li><p dir="ltr"><a href="#vulnerabilities">Common Vulnerabilities</a></p></li><li><p dir="ltr"><a href="#practices">Best Practices</a></p></li><li><p dir="ltr"><a href="#case">Case Study: The Easily Avoidable IDOR</a></p></li></ul><h2 id="methodologies">Testing Methodologies</h2><p dir="ltr">HackerOne's testing methodologies are grounded in the principles of the<a href="https://owasp.org/www-project-top-ten" target="_blank">&nbsp;OWASP Top 10</a>,<a href="https://pentest-standard.readthedocs.io/en/latest/" target="_blank">&nbsp;Penetration Testing Execution Standard (PTES)</a>,<a href="https://www.isecom.org/OSSTMM.3.pdf" target="_blank">&nbsp;Open Source Security Testing Methodology (OSSTM)</a>,&nbsp;<a href="https://www.crest-approved.org/member_companies/hackerone/" target="_blank">Council for Registered Ethical Security Testers (CREST)</a> and can be tailored to various assessment types including web applications.</p><p dir="ltr">Our methodology is continuously evolving to ensure comprehensive coverage for each pentesting engagement. This approach stems from:</p><ul><li dir="ltr">Consultations with both internal and external industry experts.</li><li dir="ltr">Leveraging and adhering to recognized industry standards.</li><li dir="ltr">Gleaning insights from a vast array of global customer programs, spanning both time-bound and continuous engagements.</li><li dir="ltr">Detailed analysis of millions of vulnerability reports we receive through our platform (see the<a href="https://hackerone.com/hacktivity/overview" target="_blank">&nbsp;Hacktivity page</a> for details).</li></ul><p dir="ltr">Threats are constantly evolving, so our methodology can't remain stagnant. HackerOne’s Delivery team, including experienced<a href="https://docs.hackerone.com/en/articles/8541431-your-pentest-team"> Technical Engagement Managers</a> (TEMs), constantly refine and adapt based on feedback and real-world experiences, delivering unparalleled security assurance.</p><h2 id="vulnerabilities">Common Vulnerabilities</h2><h4>Injection</h4><p dir="ltr">Injection is a wide category of vulnerabilities, which refers to user input data not being properly validated, sanitized, or filtered by the web application before use. Most common injection vulnerabilities include&nbsp;<a href="https://www.hackerone.com/vulnerability-management/xss-deep-dive" target="_blank">Cross-Site Scripting (XSS)</a>, SQL injection, OS Command Injection, and Server Side Template Injection. Injection bugs have severe impacts since they often enable attackers to access sensitive data, execute arbitrary code, or steal private information from authenticated users.</p><p dir="ltr">Testing for this type of vulnerability involves a mixture of automated and manual testing of all user-controlled input parameters, such as form submissions, cookies, URL parameters, as well as XML and JSON-encoded user inputs.</p><h4>Broken Access Control</h4><p dir="ltr"><a href="https://www.hackerone.com/vulnerability-management/improper-access-control-deep-dive">Broken access control&nbsp;</a>is the current top-runner in OWASP Top 10. It refers to a variety of access control issues in the web application's business and access control logic, where a user can access data they are not authorized to. Popular examples of broken access control include IDOR (Insecure Direct Object Referencing), privilege escalation, path traversal, and open redirects.</p><p dir="ltr">Testing for broken access control requires a careful examination of business logic, analysis of various access levels, and cross-tenant issues in a web application, in combination with powerful automated tools that check for auth issues in each request, such as PortSwigger&nbsp;<a href="https://github.com/PortSwigger/autorize" target="_blank">autorize</a>.</p><p dir="ltr">Authentication and authorization are hard to get right, hence the importance of pentests. Our community of ethical hackers is well-versed in testing for access control issues; in fact, it's the second most&nbsp;<a href="https://www.hackerone.com/top-ten-vulnerabilities">frequent type of bug found in HackerOne's bug bounty programs</a>.</p><h4>Information Disclosure</h4><p dir="ltr"><a href="https://www.hackerone.com/vulnerability-management/information-disclosure-deep-dive">Information disclosure</a> often occurs as a consequence of other vulnerabilities, but it can also happen on its own. From misconfigured cloud services (such as AWS S3 buckets and Google Firebase) down to memory issues (such as buffer overreads in edge devices), data leaks can occur anywhere. Failure to implement or enforce access control in REST and GraphQL APIs is another common source of information disclosure, where users can request data belonging to any other entity in the database.</p><p dir="ltr">Depending on the sensitivity of the disclosed data, it could be leveraged to perform other attacks (such as CSRF tokens, API keys, and disclosed paths in verbose error messages), or it could create direct business impact and have regulatory implications (such as leaked Personal Identifiable / Health Information).</p><h4>Vulnerable Components</h4><p dir="ltr">The supply chain of web application libraries is increasingly complex, involving thousands of frontend and backend components to support the needs of an application. It's challenging to keep them all patched and working well with each other, which is why using components with known vulnerabilities is a common finding in pentests. Depending on the vulnerability and how the component is used (either directly or as a transitive dependency), it can have serious impacts, ranging from XSS and denial of service to remote code execution.</p><p dir="ltr">Testing for vulnerable components, especially finding higher-impact vulnerabilities in backend code is much easier with white-box testing and gray-box testing setups, where the source code and SBOM (Software Bill Of Materials) are provided to pentesters.&nbsp;</p><h2 id="practices">Best Practices</h2><h4>Careful Scoping</h4><p dir="ltr">Having the right scope is crucial to a successful pentest — what is being tested can be just as important as how it is being tested. Modern web applications can be complex beasts with many different features, subdomains, APIs, and so on.&nbsp;</p><p dir="ltr">Effective pentesting hinges on the strategic selection of targets within the web application. Choosing the right focus can mean the difference between an inconsequential report with few findings (such as testing the frontend form components after a 'UI Refresh') and a valuable pentest uncovering high-impact business issues (like examining critical and complex authentication and authorization logic). HackerOne assesses your assets to determine the optimal scope for your pentest and delivers a quote tailored to your specific requirements.</p><p dir="ltr"><em><strong>Read the </strong></em><a href="https://www.hackerone.com/penetration-testing/pre-pentest-checklist-part1"><em><strong>Pre-Pentest Checklist Series&nbsp;Part 1</strong></em></a><em><strong> and&nbsp;</strong></em><a href="https://www.hackerone.com/penetration-testing/pre-pentest-checklist-part2"><em><strong>Part 2</strong></em></a><em><strong>&nbsp;to address crucial questions before your next pentest.</strong></em></p><h4>Skills-Based Tester Matching</h4><p dir="ltr">Most traditional consultancies and professional service providers rely on a static team of mixed-skilled in-house pentesters or long-term contractors,&nbsp; who are rostered on and off for every test. These testers are often based on constrained availability within their busy schedules. The result is a mixed bag with inconsistent quality depending on who is doing the current engagement.</p><p dir="ltr">With HackerOne Pentest, delivered via a Pentest as a Service (PTaaS) model, customers gain access to a diverse pool of elite, vetted security researchers who bring a wide range of skills, certifications, and experience. The community-driven PTaaS approach delivers comprehensive coverage, versatility, and&nbsp;<a href="https://www.hackerone.com/penetration-testing/modern-pentesting-effectiveness">the highest quality results&nbsp;</a>tailored to the types of assets and technology stacks of your web applications.</p><h4>Retesting</h4><p dir="ltr">After identifying and remedying a vulnerability, retesting is crucial to validate the effectiveness of the patch and ensure it is not bypassable. This is particularly vital for organizations with limited security expertise in their development teams. Our pentesters possess extensive experience in bypassing patches and filters even after vulnerabilities have been addressed with incomplete fixes, such as blocking specific payload strings in cases involving injection vulnerabilities.&nbsp;</p><p dir="ltr">HackerOne offers&nbsp;<a href="https://docs.hackerone.com/en/articles/8481554-retesting-pentests#h_ebec4b18ab">retesting as part of the pentest</a>, and requesting a retest for a vulnerability is as simple as a click of the button in the platform. Customers can request a retest at any point during the testing period and have an additional 60 days after the testing period ends.</p><h4>Zero Trust Access</h4><p dir="ltr">Providing restricted access to a testing environment, whether it be an internal application or a restricted sandbox, is always a tricky part of a pentest. For the testing of pre-release web application features, customers may wish to restrict access to the general public and only allow authorized testers into the environment.&nbsp;</p><p dir="ltr">In traditional pentest offerings, this can be a major pain point for both the customer and the testers. Security teams within organizations may reluctantly adjust firewall rules, add additional VPN accounts, and grant access to virtual desktops, ironically compromising their environment’s security to facilitate testing. This has a big impact on pentester productivity, as slow network access and cumbersome configurations quickly drain energy and focus.</p><p dir="ltr">HackerOne's&nbsp;<a href="https://docs.hackerone.com/en/articles/8470719-hackerone-gateway-v2">Gateway V2</a> offers a Zero Trust tunnel using Cloudflare's WARP technology to connect pentesters in a secure and fast manner to the target assets, along with traditional IP allowlisting rules. It uses a WARP client installed on the tester's endpoints that authenticates their identity and device to the private network and allows customers to easily grant, revoke, and audit tester access to applications wherever they are in the world. The use of&nbsp;<a href="https://www.hackerone.com/vulnerability-management/clear-and-gateway">Zero Trust Network Access (ZTNA)&nbsp;</a>for pentesting is a rare sight in traditional pentest offerings or even other PTaaS platforms and greatly enhances both network security and tester productivity during engagements.</p><h2 id="case">Case Study: The Easily Avoidable IDOR</h2><p dir="ltr">Insecure Direct Object Reference (IDOR) is a low-hanging vulnerability, but it can lead to the biggest impact: often the disclosure of all customer details just by making small changes to a predictable ID. This HackerOne&nbsp;<a href="https://hackerone.com/reports/1966006">report</a> outlines an IDOR bug that could have led to the disclosure of all user email and phone numbers within a financial web application.</p><p>&nbsp;</p><p>&nbsp;</p><p dir="ltr">This bug looks a lot like the major&nbsp;<a href="https://www.abc.net.au/news/2023-04-21/optus-hack-class-action-customer-privacy-breach-data-leaked/102247638" target="_blank">Optus data breach</a> in 2022, where roughly 10 million customers' PII (such as names, emails, and phone numbers) were stolen in a data breach. The financial impact of the breach was significant, with Optus setting aside AU$140 million (approximately $91.26 million USD) to cover the expected costs of the incident, including customer compensation and remediation efforts. This also resulted in severe legal implications, with an ongoing class action lawsuit against the company claiming that Optus breached consumer and telecommunications law and failed in its duty of care to protect users from harm.&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p dir="ltr">All that from a single IDOR vulnerability that could have been easily discovered and mitigated if a pentest had been conducted by expert web security researchers,&nbsp; , such as those available in HackerOne's extensive talent pool.</p><p dir="ltr">By utilizing HackerOne's community-driven pentest for web applications, you can efficiently identify exploitable vulnerabilities such as the IDOR explained above within a matter of days, along with numerous other complex vulnerabilities, within our standard 14-day testing cycle.</p><h2>Why HackerOne Is the Best Option for Web Pentests</h2><p dir="ltr">By choosing HackerOne as your partner in pentesting, your organization can fully benefit from the community-driven PTaaS model. This model leverages a combination of HackerOne security experts, who are skill-matched and vetted, working together with your teams to deliver the best overall ROI in risk reduction.</p><p dir="ltr">The HackerOne Platform simplifies the process of requesting a new pentest, onboarding new assets, and enlisting expert researchers in just a few days. Its purpose-built UI for reporting vulnerabilities and Zero Trust Access for fast, secure application access make web pentests more seamless and efficient.</p><p dir="ltr">With the right blend of people and technology, HackerOne is the ideal choice for your web application pentests. To get started pentesting web applications with HackerOne, <a href="https://www.hackerone.com/contact">contact us today.</a></p>
      

            
            <a href="https://www.hackerone.com/blog/topic/application-security" hreflang="en">Application Security</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/penetration-testing" hreflang="en">Penetration Testing</a>
        
    

            <p dir="ltr">Web applications are prime targets for cybercriminals across industries, from e-commerce to healthcare. To safeguard these critical assets, HackerOne offers a methodology-driven penetration testing (pentesting) solution delivered via a Pentest as a Service (PTaaS) model. This approach connects organizations with&nbsp;<a href="https://docs.hackerone.com/en/articles/8538639-pentester-selection-and-vetting-process">a heavily vetted cohort of a global ethical hacker community</a> for comprehensive, end-to-end pentesting. Frequently performing dedicated pentesting, using a community-driven PTaaS is crucial to finding vulnerabilities in your web assets and quickly remediating them to reduce risk.</p>
      ]]></description>
  <pubDate>Wed, 10 Jul 2024 17:47:54 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5392 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>HackerOne's Cloud Security Capabilities for AWS Customers </title>
  <link>https://www.hackerone.com/blog/hackerones-cloud-security-capabilities-aws-customers</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">HackerOne's Cloud Security Capabilities for AWS Customers&nbsp;</span>
    



    
        H1 Team
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Wed, 08/25/2021 - 08:00
</span>

            
  
      
  
    Image
                



          

  

      
            May 25th, 2024

      
            <p>HackerOne provides security capabilities for AWS customers looking to improve security in their cloud applications. These include vulnerability pentests specific to AWS environments, an AWS Security Hub integration for fast, effective security actions, and highly skilled, ethical hackers with AWS Security Specialty certified training. AWS customers can now identify and fix vulnerabilities quickly, develop a better understanding of their cloud application security profile, and access the expertise of AWS Certified hackers.</p><h2>Improved Cloud Application Security for Your Organization</h2><h3>Protect Your AWS Environment with Targeted Pentesting</h3><p>As part of the HackerOne Assessment offering, the new <a href="https://www.hackerone.com/product/security-assessments" target="_blank">HackerOne Assessments: Application Pentest for AWS </a>explicitly tailored for AWS-deployed applications. The pentest discovers risks specific to an organization’s AWS environment following a methodology using top HackerOne platform cloud vulnerabilities. This helps AWS customers prevent data leaks, subdomain takeovers, unauthorized access to applications, and more. Figure 1 below shows the checklist in HackerOne that specifies AWS-specific methodology parameters.</p><p><br>By combining a SaaS platform with a community of skilled, background-verified testers, teams can quickly start their pentests, gain insights to remediate risk faster, and mature their security programs.&nbsp;</p><h3>HackerOne Integrated With AWS Security Hub&nbsp;</h3><p>The new AWS Security Hub integration exchanges vulnerability findings between HackerOne and Security Hub, streamlining workflows to accelerate security actions. By consolidating and routing vulnerability intelligence from HackerOne to AWS Security Hub, the integration delivers greater visibility into crucial gaps that could lead to a cyberattack.</p><p>AWS customers can sync all HackerOne vulnerability findings and use AWS Security Hub as the single console for management and prioritization. They can also compare AWS Security Hub findings with those found by the HackerOne community to see duplicates, understand status, and <a href="https://www.hackerone.com/vulnerability-remediation-step-step-guide">plan remediation</a>, as shown in Figure 2 below.</p><p><br>With consolidated vulnerability reports, unified findings for more informed responses, and faster time to remediation, AWS customers can improve application security. HackerOne’s AWS Security Hub integration means severe vulnerabilities are routed to the right people at the right time to increase security team efficiencies, improve reporting, and reduce application exploitation.&nbsp;</p><h3>A HackerOne Community of AWS-Certified Security Specialty Hackers</h3><p>Your organization can work with highly skilled certified experts with specialized, proven expertise in vulnerabilities specific to your AWS cloud environment. You will extend your attack surface coverage and be able to address vulnerabilities from multiple threat angles, including cloud misconfigurations, unauthorized access, and data exposure. Instead of switching pentest vendors to find diverse testing expertise, you find it all in this talented community of certified hackers. Figure 3 below shows the official certification seal of a HackerOne AWS Certified Cloud Practitioner.</p><p><br>Organizations using AWS can now better protect their AWS environments against risk and attacks with highly skilled and certified hacker-powered security, more streamlined team workflows, and comprehensive and rapid vulnerability discovery and reporting.</p><p>If you’re a hacker interested in becoming a HackerOne Pentester, you can<a href="https://www.hackerone.com/hackers/pentest-community-application" target="_blank"> apply here to join our community.</a> Perform pentests together with a team of other talented security research experts and grow your resume and expertise with opportunities like AWS Certification scholarships.&nbsp;</p><h2>How HackerOne Makes Your AWS Cloud Applications Safer</h2><p>HackerOne’s all-in-one continuous security testing platform directly addresses the needs of organizations using AWS solutions. AWS customers now have access to highly skilled, AWS-certified hackers, AWS-specific pentests, and hacker-powered vulnerability insights to make their cloud applications less exploitable. <a href="https://www.hackerone.com/partners/aws">Learn how to mitigate risk faster and improve your security profile</a>, or <a href="https://www.hackerone.com/contact">get started by contacting HackerOne today.</a></p>
      

            
            <a href="https://www.hackerone.com/blog/topic/application-security" hreflang="en">Application Security</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/penetration-testing" hreflang="en">Penetration Testing</a>
        
    

            <p><span><span><span><span><span><span>As rapid digital transformation drives organizations towards AWS cloud solutions, attack surfaces expand, and cybercriminals find new opportunities to exploit cloud application vulnerabilities. Digital-native organizations and those migrating their applications to cloud must incorporate new approaches to their cloud security strategies.</span></span></span></span></span></span></p>
      ]]></description>
  <pubDate>Wed, 25 Aug 2021 13:00:00 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5088 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Grammarly CISO Suha Can Discusses the Impact of Preemptive Security with HackerOne</title>
  <link>https://www.hackerone.com/blog/grammarly-ciso-suha-can-discusses-impact-preemptive-security-hackerone</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Grammarly CISO Suha Can Discusses the Impact of Preemptive Security with HackerOne</span>
    



    
        ktansley@hackerone.com 
        
            Customer Advocacy &amp; Marketing
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Wed, 06/14/2023 - 10:50
</span>

            
  
      
  
    Image
                



          

  

      
            June 14th, 2023

      
            <h4><strong>The allure of generative AI and the importance of the basics.</strong></h4><p>While the advent of generative AI poses new challenges, it's important not to neglect the fundamentals. Implementing measures like MFA, phishing prevention, patching, and addressing misconfigurations should remain a focus. Grammarly has offered an AI-enabled product since before AI was a buzzword and has already launched its own generative AI product: <a href="https://www.grammarly.com/grammarlygo">GrammarlyGO</a>. Many CISOs now have to think about how generative AI impacts cyber risk, but for companies that already live in the AI space, it has been easier to see through the buzz and stay true to their threat model.</p><ul><li><em>“Generative AI tools are new, but most of the existing fundamentals of cybersecurity haven’t changed. It can be easy to get distracted by the shiny thing, but an offensive security team should continue to do what they always do: finding issues in the core ways in which their systems are built and configured.” </em>– <strong>Suha Can</strong></li></ul><p>&nbsp;</p><h4><strong>Bug bounty helps validate - or invalidate - your security beliefs.</strong></h4><p>Are we really secure, or do we just feel secure because we’ve deployed controls? As a company’s security maturity increases, it becomes crucial to validate the effectiveness of security programs. This involves assessing factors such as time to remediation, continuous monitoring of security controls, and questioning assumptions. Grammarly views bug bounty as a systemic way to uncover flaws in its attack surface and a way to challenge its controls with unconventional testing methods.</p><ul><li><em>“Preemptive security is about working to disconfirm your beliefs. The first step is usually doing something like a pentest where you validate your security, but after that, you must start seeking invalidation of your controls. The underlying mantra is that by being humble and second-guessing yourself, you are actually able to be a much better guardian of customer data.” </em>– <strong>Suha Can</strong></li></ul><p>&nbsp;</p><h4><strong>Value to the board: </strong><em><strong>“Seeing around corners.”</strong></em></h4><p>Building products securely requires asset inventory, cloud configuration scans, and static and dynamic analysis, but these measures alone are not sufficient. A combination of scalable and non-scalable security approaches is vital to ensure that all bases are covered and helps reassure your board of directors that you aren’t relying on any single control to keep your crown jewels safe. Grammarly works with HackerOne to catch what the scanners miss and to uncover blindspots in its attack surface - a mission that relies more on the creativity of hackers than on cutting-edge technology.&nbsp;</p><ul><li><em>“The main value that I communicate to the board is that HackerOne helps us find out what we don't know and helps us see around corners. That resonates very well with the executive team at Grammarly. It’s not just that we fixed 15 new vulnerabilities this month; it’s typically a bigger conversation where I share anecdotes about how reports have led to more insights and investments.” </em>– <strong>Suha Can</strong></li></ul><p>&nbsp;</p><h4><strong>Value to the engineers: </strong><em><strong>“Focus and prioritize.”&nbsp;</strong></em></h4><p>Grammarly uses insights and trends from its bug bounty program and other preemptive security initiatives to focus its efforts. Grammarly’s security team conducts a weekly review of vulnerability reports from HackerOne and other preemptive security sources; it then initiates a deeper review of any assets or services with spikes in reports or the potential for variants of recent vulnerabilities.&nbsp;</p><ul><li><em>“A vulnerability for a specific service may also apply to other services you have, or a slightly different attack on the same service could succeed. Those additional vulnerabilities aren’t in the report you receive from the hacker, but because you get that first report now you can investigate further and uncover any additional issues. This also leads to attack surface reduction and a ‘defense in depth’ style hardening across your systems.” </em>– <strong>Suha Can</strong></li></ul><p>&nbsp;</p><h4><strong>Measuring bug bounty program health.</strong></h4><p>Grammarly’s key indicator of bug bounty program health is the number of unique researchers submitting valid vulnerabilities every quarter. In a world where new bug bounty programs launch every day, maintaining hacker engagement is imperative. Grammarly’s HackerOne program has run for five years, and Grammarly keeps it fresh by adding new scope (like GrammarlyGO, Grammarly’s new generative AI product) and running promotions (like the $100k critical bounty that Grammarly debuted).</p><ul><li><em>“When I look at my board metrics, the main metric I convey to the board about the health of my bug bounty program is the number of unique researchers that have reported at least one vulnerability in a given quarter. The program is only as good as the engagement from researchers, and researchers can spend their time on any program.” </em>– <strong>Suha Can</strong></li></ul><p>&nbsp;</p><p>This conversation between Suha and Alex underscores the importance of a preemptive approach to cybersecurity. Embracing AI advancements while maintaining a strong foundation in fundamental security practices is paramount. At the same time, the power of bug bounty programs to validate (or invalidate) security measures by tapping into the perspective of an attacker is undeniable. As the cybersecurity landscape continues to evolve, we hope these insights provide guidance as you navigate this complex and ever-changing domain.</p><p>&nbsp;</p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/customer-stories" hreflang="en">Customer Stories</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/application-security" hreflang="en">Application Security</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/bug-bounty" hreflang="en">Bug Bounty</a>
        
    

            <p><span><span><span><span><span><span>Suha Can, the CISO of Grammarly, recently joined HackerOne’s CTO &amp; Co-founder, Alex Rice, for a discussion on user trust, the benefits of Grammarly’s bug bounty program, and the advantages of preemptive security measures. You can </span></span></span></span></span></span><a href="https://hackerone.wistia.com/medias/yvyox3242k"><span><span><span><span><span><span><span><span>view the full webinar here</span></span></span></span></span></span></span></span></a><span><span><span><span><span><span>, or read the highlights from their conversation here:</span></span></span></span></span></span></p>
      ]]></description>
  <pubDate>Wed, 14 Jun 2023 15:50:21 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5252 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>How Optimistic Can Security Professionals Afford to Be in 2023?</title>
  <link>https://www.hackerone.com/blog/how-optimistic-can-security-professionals-afford-be-2023</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">How Optimistic Can Security Professionals Afford to Be in 2023?</span>
    



    
        Mahesh Chukkapali
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Wed, 04/12/2023 - 09:23
</span>

            
  
      
  
    Image
                



          

  

      
            April 12th, 2023

      
            <p>CyberEdge <a href="https://cyber-edge.com/cdr/" target="_blank">reports</a> that the percentage of companies that experienced at least one successful cyberattack dropped again, following years of annual increases. Organizations reporting six or more significant attacks in the last year decreased for the first time in 12 years. These results have provided businesses with optimism for the management and security of their infrastructures in the future: the number of organizations concerned their employees may fall victim to a successful cyberattack also dropped for the first time in six years. But do these numbers correlate with organizations getting a better handle on cybersecurity risk? The report also cited a growing skills gap, fragmented security solutions, and expanding attack surfaces, which suggests otherwise.</p><p>Hybrid work, shadow IT, and the rapid transition to multiple cloud environments have significantly contributed to the expansion of the attack surface for many organizations. Rushed digital transformation has also furthered the proliferation of cyberattacks, during and after the pandemic. It appears that minor reductions in breach statistics and an overabundance of security tools may have given some organizations a false sense of safety.</p><h2>Organizations Struggle To Manage Expanding Attack Surfaces</h2><p>Various research shows a sizable attack resistance gap between what companies can protect and the assets they must defend. A recent HackerOne report found <a href="https://www.hackerone.com/attack-resistance-report-2022">only 63% of organizations’ total attack surface</a> was estimated to be resistant to attack, and <a href="https://www.hackerone.com/company-news/announcing-hackerone-2022-attack-resistance-report-security-survey-how-close-your">44% of cybersecurity professionals</a> lacked confidence in their capacity to mitigate the dangers brought on by this visibility gap. Six main factors contribute to an organization's lack of confidence:</p><ul><li><strong>Incomplete Knowledge:</strong> Attack surfaces constantly change due to the expanded supply chain, software, apps, and infrastructure. In fact, a third of large companies have trouble monitoring <a href="https://www.hackerone.com/company-news/announcing-hackerone-2022-attack-resistance-report-security-survey-how-close-your">more than 25% of their attack surfaces</a>.</li><li><strong>Testing Frequency is Not at Pace</strong>: Testing frequency is not keeping up with development cycles, which are moving more quickly than before. Delays in testing and upgrades let vulnerabilities slip through and become exploited.</li><li><strong>Scanners are limited:</strong> Vulnerabilities that follow known patterns are easy to find with automated scanning, but the real risk is the unknown threats that lead to critical application security issues. These critical vulnerabilities missed by scanners create a false sense of security.</li><li><strong>Automation is Still Falling Short: </strong>While many security tools promise a lot, automation has yet to live up to its promise of securing the enterprise. Automation can be fast at finding and defending known threats, but automation misses critical zero-day vulnerabilities, and that gap gets larger as one considers the additional challenge of continuously increasing attack surface complexity. It’s important to recognize that while automation offers advantages to security teams, it also offers similar advantages to cybercriminals. Bad actors <a href="https://securityscorecard.com/blog/cybercriminals-leverage-weaponized-ai-for-cyber-attacks/" target="_blank">already weaponize AI</a> to exploit vulnerabilities quickly and at scale.</li></ul><h2>A Shortage of Skilled Personnel Is The Greatest Concern</h2><p>A shortage of skilled personnel is the most significant impediment for security teams. Industry giants announcing personnel cutbacks of thousands or more have been widely reported in the media.<strong> </strong>As the cybersecurity skills gap widens, stress on internal teams has been exacerbated by a <a href="https://www.infosecurity-magazine.com/news/cybersecurity-workforce-gap-grows/#:~:text=The%20global%20cybersecurity%20workforce%20gap,2%202022%20Cybersecurity%20Workforce%20Study." target="_blank">26% increase since last year</a>. CyberEdge notes <a href="https://cyber-edge.com/cdr/" target="_blank">seven in eight organizations (87%) are experiencing a shortfall</a> of security talent, with IT security administrators in greatest demand.</p><p>While many businesses are laying off employees in departments like marketing, sales, product management, and human resources, the majority are keeping their security specialists on staff. However, there remains a lack of skilled personnel to keep up with the different threats and security specialties organizations require; <a href="https://www.hackerone.com/attack-resistance-report-2022" target="_blank">80% of firms are concerned that they do not have the skills to keep up with container and cloud-native development trends</a>. In addition, most security teams are outnumbered by developers, making it difficult to keep up with the pace of change.</p><p>As the global cybersecurity workforce deficit of <a href="https://fortune.com/education/articles/the-cybersecurity-industry-is-short-3-4-million-workers-thats-good-news-for-cyber-wages/#:~:text=The%20cybersecurity%20workforce%20has%20reached,Cybersecurity%20Workforce%20Study%20released%20Thursday." target="_blank">3.4 million</a> people continues to rise,the cybersecurity industry looks to develop new strategies and measures to help scale security teams.</p><h2>The Board and the Bottom Line Dictate Security Investment&nbsp;</h2><p>Tech stack complexity and the security talent gap will likely lead companies to consolidate tools across security pillars, especially as the economy contracts. Companies will evaluate security budgets and make investment decisions based on the higher ROI that comes from a platform solution with well-integrated tools that share intelligence, to improve their outcomes.&nbsp;</p><p>Human-powered security is necessary to combat the malicious creativity of cybercriminals, adept at circumventing cybersecurity defenses. The business impact of a breach is well documented, and the CyberEdge report reinforces the attention the board gives to avoiding one; <a href="https://cyber-edge.com/cdr/" target="_blank">nearly all (97%) surveyed organizations</a> reported that their information security leaders engage board members directly. In other words, world-class cybersecurity is no longer ‘nice to have.’ It’s a ‘must-have’ for organizations to survive.&nbsp;</p><p>Security continues to grow in both the public and the private sector. CyberEdge reports the average information security expenditure increased by 5.3% for organizations in 2023. The success of IT leadership in educating senior executives and board members about cybersecurity issues may also be reflected in increased spending. Organizations are compelled to actively contribute to stronger collective resilience as a result of the announcement of the new cybersecurity plan and greater expenditures.</p><p>As the attack landscape becomes more robust, organizations must remain attentive in their search for, and recruitment of, the displaced workers from those companies that have made cuts, as the threat landscape becomes stronger and the shortage of experienced IT security employees continues to diminish. Your organization could even consider providing cybersecurity training and certification as a recruitment tool.&nbsp;</p><p>Notwithstanding the apparent optimism, cybersecurity experts must maintain their vigilance. We’re continually involved in a protracted, difficult process, but securing robust cyber defenses is the best course of action for our country, its infrastructure, the economy, and our shared futures.</p><p><em>I’d love to hear more about your challenges and plans to secure the coming year. </em><a href="https://www.hackerone.com/contact"><em>Contact us</em></a><em> to&nbsp;talk about how you manage your attack surfaces and what ethical hackers could do to your ability to scale your security efforts</em></p>
      

            
            <a href="https://www.hackerone.com/blog/topic/application-security" hreflang="en">Application Security</a>
        
    

            <p><span><span><span><span><span><span>Cyber attackers are increasingly well-resourced and elusive. Yet, CyberEdge's 2023 Cyberthreat Defense Report found IT and security professionals are feeling optimistic about their ability to handle cybersecurity risk.</span></span></span></span></span></span></p>
      ]]></description>
  <pubDate>Wed, 12 Apr 2023 14:23:26 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5232 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>100 Conversations with Start-up Security Leaders</title>
  <link>https://www.hackerone.com/blog/100-conversations-start-security-leaders</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">100 Conversations with Start-up Security Leaders</span>
    



    
        Chris Campbell
        
            Sales Engineer, EMEA
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Wed, 04/05/2023 - 11:57
</span>

            
  
      
  
    Image
                



          

  

      
            April 11th, 2023

      
            <h2>1. Why are run-of-the-mill, traditional pentests not delivering effective results?</h2><p>Time and time again, I speak to disappointed security practitioners who run one, or sometimes several, penetration tests with traditional suppliers. These engagements don’t suit their needs — from long lead times for scheduling, shallow results that don’t find the most critical flaws, and a final report delivered weeks later.&nbsp;<br><br>This approach is increasingly unsuitable for many organizations as agile development practices have become the norm. Traditional pentesting often can’t mitigate risk in line with release cycles. Modern organizations have adopted continuous software releases, but The <a href="https://www.hackerone.com/resources/reporting/2022-attack-resistance-report">2022 Attack Resistance Report</a> found only 1 in 3 applications are tested and assessed more than once a year. A report delivered six weeks after the launch of a new beta system, which has seen hundreds of continuous releases since the testing window began, may be of limited use.</p><h2>2. As my business undergoes digital transformation, how can continuous application security testing help maintain security visibility?</h2><p>If you have fewer than four security personnel within your organization, you’re not alone. Of my first 100 conversations with start-up and scale-up companies, only one had a dedicated security team of five people or more. Whether your DevOps team is regularly spinning up Kubernetes clusters or your marketing team is creating microsites, it’s extremely difficult to maintain visibility and secure all your digital assets.<br><br>The majority of our customers reach out to me because they want help building stronger security teams and processes rather than the other way around. This tells me the demand is there for solutions like bug bounty programs and that utilizing a global talent pool of hackers is quickly becoming the norm for the forward-thinking security leaders of our time.</p><h2>3. How does my security team maximize efficiency and productivity?</h2><p>On average, HackerOne’s global team of analysts works around the clock to process <a href="https://www.hackerone.com/services" target="_blank">3,000 vulnerability reports per week</a>. Some of our most active public customers receive between 100-200 valid vulnerability reports per quarter. This might sound like an overwhelming volume of information, but with the help of our highly-skilled professional triage team, we take the weight off the shoulders of your internal security teams and help them focus on <em>fixing</em> vulnerabilities, not <em>validating </em>them.</p><p>The majority of scale-up security leaders I speak with tell me this support saves valuable time on vulnerability management that is instead directed toward building their actual product. If time is money, developer time is gold.&nbsp;</p><h2>4. How do we utilize ethical hackers and monitor their access to our network?</h2><p>While many cybersecurity leaders recognize the value of working with hackers before we’ve even begun a conversation, it is still common to see hesitation within organizations at large.<br><br>Legal and PR teams can balk at the idea of inviting hackers to test your defenses. However, even the most risk-averse organizations, including the DoD and Goldman Sachs, recognize that it’s more of a risk not to ask hackers to help. And hackers want to do good in the world. We’ve <a href="https://www.hackerone.com/reports/6th-annual-hacker-powered-security-report" target="_blank">surveyed our hacker community for years</a> to understand why they hack. The majority of hackers are pursuing job opportunities — 59% are looking to build skills and gain experience to advance their careers in cybersecurity. Forty-six percent want to help protect users and defend organizations against malicious attacks. Not only are hackers passionately motivated, but they also find vulnerabilities that traditional tools miss.&nbsp;<br><br>However, for organizations that need the strictest control and guarantees, HackerOne provides a number of options: programs can limit access exclusively to our Clear hackers, who are fully security vetted and background checked. The <a href="https://docs.hackerone.com/hackers/configure-the-hackerone-vpn.html" target="_blank">HackerOne Gateway service </a>provides numerous controls to maintain oversight of a hacker’s activity.</p><h2>5. How do we integrate security earlier into our development lifecycle?</h2><p>“Shifting Left” describes development practices and workflows designed to find and remove vulnerabilities earlier in the Software Development Lifecycle (SDLC). Everyone knows that finding vulnerabilities and bugs in code as early as possible saves money in developer time, customer impact, and avoiding service downtime.<br><br>But, despite the rising popularity of shifting left in cybersecurity, I still get questions about the need to find vulnerabilities in production-level systems if automated scanners can find them earlier.<br><br>Although you should absolutely implement good security scanners for your code to mitigate known types and classes of vulnerabilities, what scanners currently exist that can find complex, chained exploits at the human-layer logic of your business? Only human creativity can find novel vulnerabilities in your code. No training data can teach the best machine learning algorithms how to do this. See this publicly-disclosed <a href="https://hackerone.com/reports/1819832" target="_blank">exploitation</a> a hacker found on Snapchat only earlier this year.</p><h2>HackerOne: Your Security Testing Partner&nbsp;</h2><p>From my first 100 conversations with organizations about HackerOne, I have found that security leaders are increasingly open to adopting crowdsourced hacking services to help them enable business transformation for their organizations.&nbsp; HackerOne’s Attack Resistance Platform lowers your organization’s threat exposure across its entire attack surface. Your bug bounty, Attack Surface Management, and Pentest as a Service (PTaaS) solutions are centralized under a single platform and enhanced by adversarial testing performed by hackers.&nbsp;&nbsp;</p><p>Your organization is embracing transformation, but how much of your attack surface is exposed to cybercrime? <a href="https://www.hackerone.com/contact">Contact the team at HackerOne today</a>&nbsp;to learn how your organization can become faster than cybercrime.</p>
      

            
            <a href="https://www.hackerone.com/blog/topic/application-security" hreflang="en">Application Security</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-management" hreflang="en">Vulnerability Management</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/penetration-testing" hreflang="en">Penetration Testing</a>
        
    

            <p><span><span><span><span><span><span>Every day, HackerOne Solutions Engineer Chris Campbell speaks to cybersecurity leaders who struggle to keep up with the threat landscape. Leaders look to him to connect them with the world’s most coveted and accomplished ethical hackers, who have found critical vulnerabilities in the world’s largest enterprises and most successful small/medium businesses.</span></span></span></span></span></span></p>

<p><span><span><span><span><span><span>In this post, Chris shares the most impactful and common questions from his first 100 conversations with security professionals and how your organization can maximize its security outcomes.</span></span></span></span></span></span></p>
      ]]></description>
  <pubDate>Wed, 05 Apr 2023 16:57:08 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5229 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Robinhood Goes Long on Bug Bounty: Q&amp;A with Ian Carroll and @ashwarya</title>
  <link>https://www.hackerone.com/blog/robinhood-goes-long-bug-bounty-qa-ian-carroll-and-ashwarya</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Robinhood Goes Long on Bug Bounty: Q&amp;A with Ian Carroll and @ashwarya</span>
    



    
        ktansley@hackerone.com 
        
            Customer Advocacy &amp; Marketing
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Wed, 02/22/2023 - 14:00
</span>

            
  
      
  
    Image
                



          

  

      
            February 22nd, 2023

      
            <p>Our conversation with Ian Carroll (Staff Security Engineer at Robinhood) spans the history of bug bounty at Robinhood, Ian’s approach to bug bounty program management, and why the hacker experience is so important to him. Stick around for the end of this article where we interviewed Ashwarya Abishek, the top hacker on Robinhood’s program with over $100,000 in bounties earned! Ashwarya explains how he decided to become an ethical hacker and why he chose to hack Robinhood.</p><p>&nbsp;</p><h5><strong>&gt; Customer Q&amp;A with Ian Carroll</strong></h5><h4>Q: Tell us who you are.&nbsp;</h4><p>Ian: My name is Ian Carroll, and I'm a staff security engineer at Robinhood. I lead our bug bounty programs at Robinhood, and I'm also a member of our Red Team, where we work on finding and fixing security issues in Robinhood, much like a bug bounty researcher would.</p><h4>Q: Tell us a bit about Robinhood and why cybersecurity is so important to your business.&nbsp;</h4><p>Ian: Robinhood is a trading app that allows our customers to trade stocks and cryptocurrencies, save and spend money with our spending account, and more. Safety First is Robinhood's primary company value, and protecting our customers and their assets is extremely important to us. It's our responsibility to ensure we are providing confidence and trust for our customers as they entrust us with safeguarding their money and investments.</p><h4>Q: Tell us about your HackerOne journey. How has your program evolved over time?&nbsp;</h4><p>Ian: Robinhood has had a HackerOne Bounty program since 2016, nearly since Robinhood itself launched! Our CEO was actually still a member of our HackerOne team when I joined. Based on our early successes, we have increased our dedicated resources to grow the program further. In the past year, we expanded our program’s scope, launched two new private programs on HackerOne, and awarded more bounties over the past year than ever.</p><p>We’ve also improved our internal processes for handling submissions. Once validated, our Vulnerability Management team has built a stellar process for tracking and handling vulnerabilities coming from the bug bounty. Service owners can see all of the vulnerabilities for their service and the associated SLAs for every reported vulnerability. We also started using CVSS ranges to calculate bounty payments, which drive more consistent payouts and remediation in our program.</p><h4>Q: What role does your bug bounty program play in your overall security landscape?&nbsp;</h4><p>Ian: Our bug bounty program is an important way for us to validate that the work we are doing to improve our security is working. Our Product Security and Enterprise Security teams create comprehensive mitigation plans based on findings from the bug bounty program and vulnerabilities from other programs such as pentests and red team engagements. These efforts result in a reduction in each type of issue. Similarly, findings from our bug bounty program often let us identify services or features that need extra attention from us so that we can further target penetration tests, additional code reviews, etc.</p><p>One key example of this has been around our acquisitions – we’ve been able to quickly add the assets of our new acquisitions into our HackerOne programs, and then we immediately start to get visibility into the specific risks each asset may have. The acquired companies also appreciate getting this new visibility, which allows us to build relationships with their teams while working together to remediate any reports.</p><h4>Q: Tell us about your favorite bug or most interesting finding from your program. Any other surprising outcomes from the program?&nbsp;&nbsp;</h4><p>Ian: Some of our best reports have actually come from our own customers who create a HackerOne account just to submit a finding to our program! One really interesting report we recently received was from a customer using a particular smartphone where the biometric authentication wasn’t working correctly only on that specific model. We were able to find someone else on our team who had the same phone and reproduce the issue, but we would have never noticed this kind of issue ourselves! We quickly got a fix out and paid them their first bug bounty. Our customers have also helped us find complex issues in our trading flows that don’t look like normal security issues at all, but are highly impactful to our business.</p><h4>Q: How do hackers help you spot vulnerability trends across your attack surface?&nbsp;</h4><p>Ian: I'm very happy with the scope of our bug bounty program, where we accept almost any security issue that could impact Robinhood, regardless of what technical asset has the problem. We also get a lot of interesting submissions about third-party vendor products and misconfigurations because we have all of our domains and applications in scope. In addition, we run private programs for our acquisitions to further strengthen those assets.</p><p>As a relatively younger company, casting this wide net helps us identify trends across everything we use. In the future, we’re working on creating and distributing reports to our other teams on security based on the Common Weakness Enumeration (CWE) trends, which will help teams easily identify the types of vulnerabilities we are seeing!</p><h4>Q: Ian, along with being a customer, you also hack on the HackerOne platform. From experiencing both sides of the coin, what are some best practices for forming mutually beneficial relationships with hackers?&nbsp;</h4><p>Ian: It’s been very useful for me to have the perspective of both a researcher and a program manager. It gives a lot of insight into how both sides interact and what they expect and helps me focus on what I know researchers would appreciate the most. My first priorities with our program were to set up quick and consistent triage and awards to researchers, as I find this is a struggle for many programs.</p><p>We also try to be candid and transparent with hackers. In our private programs, where we have NDAs in place, we can often share source code snippets and other internal documentation to help the researcher understand the root cause of an issue or why the severity was set in a specific way. Additionally, when we can escalate an issue to be more severe than what a researcher reported, we always pay the researcher for the higher severity. We hope this builds a lot of trust and goodwill between both the researcher and Robinhood.</p><h4>Q: What will long-term success look like for hacker-powered security at Robinhood?&nbsp;&nbsp;</h4><p>Ian: We aim to keep shifting left in the product development lifecycle and letting researchers find as many vulnerabilities across as many new and existing features as possible. We have been granting our VIP researchers access to new product releases before the general public has access, and we hope to continue doing this for the foreseeable future. Additionally, we’re working on test accounts so that researchers outside the United States can test our assets just as anyone else can.<br>&nbsp;</p><h5><strong>&gt; Hacker Q&amp;A with @ashwarya</strong></h5><h4>Q: Tell us who you are.</h4><p>Ashwarya: Hi! My name is Ashwarya Abhishek. I’m from Delhi, India. I came from the financial field as an aspiring chartered accountant, but circumstances brought me to bug bounty, and I have been doing it full-time since 2020.</p><h4>Q: How long have you been hacking/in the cybersecurity industry?</h4><p>Ashwarya: I have been into bug bounty full-time since January 2020. I started doing bug bounty in 2014 as a part-time hobby when I discovered the HackerOne platform. Back then, I would read public reports and apply similar logic to different programs (Yahoo, Twitter, etc.). That approach got me a few bounties, but soon I got responses of ‘N/A’ and ‘Informative’ on all my reports, leaving me with terrible stats (&lt;200 Reputation, negative Signal, &lt;10 Impact). I soon realized that bug bounty was not for me, and I quit sometime around the beginning of 2016. I was only sending reports without understanding my findings, so those responses were bound to happen sooner or later.&nbsp;</p><p>During 2018-2019 I was going through severe financial issues, and out of nowhere, I received a Private Invite from Exness to hack on their HackerOne bug bounty program. Out of curiosity, I opened the link and accepted the invitation. There were lots of things going on in my mind for the next two days as this invitation and the sudden recollection of HackerOne and bug bounty brought a ray of hope into my life.</p><p>On January 1, 2020, I decided to quit my day job and jump into bug bounty. The reason was straightforward: earnings from my day job - even if I saved for the next decade - would not help me get out of the financial issues I was going through, but there was a ray of hope from bug bounty.</p><p>Everyone who came to learn about my decision called it dangerous as I did not possess any cybersecurity degree or certification and had no training. Even my past HackerOne stats were screaming not to pursue the infosec route full-time. There was also no surety that I would be able to find enough bugs to earn close to my monthly salary.</p><p>Circumstances ultimately brought me to this path, and I do not regret my decision to quit my profession. I started from scratch, gradually learned, and I haven’t looked back since I started full-time in 2020.</p><h4>Q: How long have you been hacking on Robinhood, and why did you choose to focus on Robinhood’s program?</h4><p>Ashwarya: I started hacking on Robinhood on January 1, 2022.<strong> </strong>I hack on Robinhood primarily due to their response efficiency and decent bounties.</p><h4>Q: What do you enjoy about hacking on Robinhood? What keeps you motivated to hack on this program?&nbsp;</h4><p>Ashwarya: I’m motivated by the wide scope of Robinhood’s program. It’s been a full year, and I believe I haven’t fully explored 50% of their endpoints, and getting access to the restricted services always excites me. In the beginning, I sensed that there were very few hackers who could have gone deeper with this program (due to restrictive access), so I thought there was a lot of potential for me and my 100% manual approach to hacking, and I wasn’t wrong with my judgment.</p><p>I also value Robinhood’s transparency during report evaluation, and their bounty pay-out upon triage keeps me motivated to continue digging around this program.&nbsp;</p><h4>Q: Without giving away scope that’s not already public, how do you approach the target?&nbsp;</h4><p>Ashwarya: Broadly speaking, my manual approach remains plain and simple.</p><p>1.&nbsp; I manually check every single subdomain every few days to identify potential subdomain takeovers or application-level misconfigurations. It also helps me to identify any hidden subdomain apps where I need to dig deeper since there are higher chances you might end up with API keys or secrets in a .js file linked with these hidden apps.</p><p>2.&nbsp; I manually visit every API endpoint repeatedly until I understand the flow and its intended purpose. Once I am familiar with the endpoints and flows, it is far easier to spot any weird behavior and potential changes/issues. Although this is a time-consuming task, it is the most important thing for me with any target, and it is worth the effort.</p><p>3.&nbsp; I do not approach a target with any specific issues in mind. Instead, my approach relies purely upon the logic in the target process flows.</p><h4>Q: If someone was new to this program, what advice would you give them?</h4><p>Ashwarya: Try familiarizing yourself with the flows first (API routes, etc.). Robinhood’s scope is very wide (there are 1,000+ API endpoints in the primary target itself), and there is a good chance you will catch issues if you are familiar with how things work here. But if you solely rely on automation (public tools), chances are pretty high that you will end up disappointed.&nbsp;</p><p>&nbsp;</p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/customer-stories" hreflang="en">Customer Stories</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/best-practices" hreflang="en">Best Practices</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/application-security" hreflang="en">Application Security</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/bug-bounty" hreflang="en">Bug Bounty</a>
        
    

            <p><span><span><span><span><span><span>Seven years of bug bounty, 21-hour average time to bounty, 130 hackers thanked, and hackers on both sides of the program: Robinhood’s Ian Carroll joins us to discuss his hacker-focused approach to bug bounty, and Robinhood’s top hacker @ashwarya chimes in with his experience.</span></span></span></span></span></span></p>
      ]]></description>
  <pubDate>Wed, 22 Feb 2023 20:00:00 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5214 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Outsmart Cybercriminals with Proactive Attack Surface Management (ASM)</title>
  <link>https://www.hackerone.com/blog/outsmart-cybercriminals-proactive-attack-surface-management-asm</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Outsmart Cybercriminals with Proactive Attack Surface Management (ASM)</span>
    



    
        Naz Bozdemir
        
            Senior Product Manager
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Tue, 02/07/2023 - 10:20
</span>

            
  
      
  
    Image
                



          

  

      
            February 7th, 2023

      
            <h2>Why is ASM Important?</h2><p>Your attack surface is the sum of all entry points an attacker could use to access your systems, applications, devices, or network. For most organizations, it’s a complex web of Internet-facing hardware and software assets, including any open ports and services, logic systems, and unmitigated vulnerabilities.</p><p>The larger your attack surface, the more opportunities an attacker has to gain entry. Today, attack surfaces are overwhelmingly larger than even a decade ago, and IT and security are scrambling to stay on top. This is why ASM is so important.</p><p>ASM is the continuous discovery, inventory, analysis, and remediation of all components within an organization’s attack surface. This means maintaining a complete and current picture of all externally accessible digital assets, including hardware, web properties, IP addresses, systems, and services. It also requires continuous monitoring and analysis of all assets to identify and remediate vulnerabilities and configuration issues that attackers could exploit.</p><h2>The Attack Resistance Gap</h2><p>Effective ASM is among the top security challenges for organizations today.</p><p>HackerOne surveyed over 800 respondents from various industries, organization sizes, and locations. A third of respondents from large enterprises said at least 25% of their attack surface is unknown, while almost 20% believe over half is unknown.</p><p>Based on these figures, a typical enterprise’s attack surface could contain thousands of unknown, unprotected digital assets. These unprotected assets form a large part of the <em>attack resistance gap</em>—the portion of an organization’s attack surface that is not ready to resist attack. Collectively, respondents said just 63% of their attack surface is prepared to resist attack, leaving an attack resistance gap of 37%.</p><h2>Why ASM Alone Can’t Solve the Problem</h2><p>ASM solutions continuously monitor the attack surface to discover, inventory, and assess the security profile of externally-facing assets. Once discovered, identified assets are added to a single repository, through which an organization can track its attack surface. Typically, asset entries are enriched with a range of information, technical details, network and Internet identifiers, weaknesses (e.g., open ports or known vulnerabilities), and an estimated risk score.</p><p>These technologies are an essential part of any ASM program. They enable an organization to close the attack resistance gap and prioritize security resources to address high-risk issues. ASM can also help organizations achieve a variety of other security and business objectives, including:</p><ul><li>Identifying exposed development infrastructure.</li><li>Securing APIs.</li><li>Supporting M&amp;A activities.</li><li>Ensuring compliance with data protection regulations, e.g., GDPR.</li></ul><p>However, ASM alone isn't enough to stay on top of an organization’s full attack surface. This technology relies heavily on asset data provided by security and IT teams, which is typically incomplete or outdated. As a result, attack surface scanners inevitably miss some assets, leaving them stranded outside the scope of an organization’s cybersecurity program.</p><p>ASM solutions also typically have a high false positive rate, which requires manual intervention to assess. Since this takes time, most asset repositories provide an incomplete and outdated picture of cyber risk.</p><h2>The Solution: Combining Automation with Human Security Expertise</h2><p>If automation alone isn’t the solution, what is? Combining automation with the reconnaissance skills of handpicked security experts.</p><p>Security testers and researchers frequently uncover unknown assets during their work. Unlike automation, which can only uncover assets using a logical, brute-force approach, humans can often recognize discovered assets as belonging to an organization even if they aren’t linked to other known assets. This makes human security experts an ideal counterpart for automated tools to help any organization uncover and manage its full attack surface.</p><p>HackerOne provides the incentives, technology platform, and workflows security experts need to formalize this discovery process and submit new assets directly to the organizations they work with. The solution includes a dynamically updated asset inventory that becomes the single source of truth for an organization’s attack surface.</p><p>Unlike other solutions, ours ingests results from HackerOne’s continuous scanner, imports results from other solutions, <em>and</em> captures assets uncovered by our community of security experts. This hybrid approach to ASM is substantially more effective compared to pure automation.</p><p>Enterprise customers see their visible attack surface visibility more than double with HackerOne, often discovering hundreds or thousands of previously unknown assets. At the same time, they are able to reduce the time and effort required for asset inventory management and maintenance.</p><h2>Bolster Your Security Strategy with Human Expertise</h2><p>To help your organization gain a complete picture of its attack surface by combining automation with expert human-powered security, <a href="https://www.hackerone.com/contact">contact HackerOne today.</a></p>
      

            
            <a href="https://www.hackerone.com/blog/topic/application-security" hreflang="en">Application Security</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-management" hreflang="en">Vulnerability Management</a>
        
    

            <p><span><span><span><span><span><span>Over the last decade, many organizations have seen their attack surface soar out of control.</span></span></span></span></span></span></p>

<p><span><span><span><span><span><span>Digital transformation initiatives, cloud migrations, and increased uptake of user-centric technology architectures have led to huge growth in Internet-accessible assets. At the same time, the number of CVEs reported annually has risen substantially.</span></span></span></span></span></span></p>

<p><span><span><span><span><span><span>As a result, security teams are scrambling to secure known assets while maintaining a complete picture of their asset inventories—and often falling short on both counts.</span></span></span></span></span></span></p>
      ]]></description>
  <pubDate>Tue, 07 Feb 2023 16:20:41 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5211 at https://www.hackerone.com</guid>
    </item>

  </channel>
</rss>
