Ethical hackers are helping more and more business stay safe

A white padlock on a dark digital background.
(Image credit: Shutterstock.com)

As businesses rush to deploy emerging technology to stay ahead of the competition, they’re also putting themselves in the line of fire of various cybercriminals looking to deploy malware. Ethical hackers, however, are taking the shots, as every day they help more and more businesses stay safe and secure. 

This is according to a new report from HackerOne, a hacking program that rewards ethical hackers for discovering and responsibly disclosing major vulnerabilities. According to the new report, the ethical hacker community just surpassed $300 million in total all-time rewards on the platform.

Of that number, 30 hackers earned more than a million dollars. One hacker earned more than four million.


Reader Offer: $50 Amazon gift card with demo

Reader Offer: $50 Amazon gift card with demo
Perimeter 81's Malware Protection intercepts threats at the delivery stage to prevent known malware, polymorphic attacks, zero-day exploits, and more. Let your people use the web freely without risking data and network security.

Preferred partner (What does this mean?

Big payouts

Perhaps unsurprisingly, the highlight of this year’s 2023 Hacker-Powered Security Report is Generative AI. It was said that more than half (55%) of hackers plan for the tool to become a top target in the coming years. Almost two-thirds (61%) will use and develop hacking tools from Generative AI to find more vulnerabilities, and another 62% plan to specialize in the OWASP Top 10 for Large Language Models. 

GenAI will also be used to write better reports (66%) and better code (53%), as well as to beat language barriers (33%).

One of the reasons for the rising popularity of ethical hackers is the lack of in-house expertise and talent. In fact, 70% of customers said hacker efforts helped them avoid a significant cyber-incident. Furthermore, 75% of HackerOne customers believe exploited vulnerabilities are their number one threat, surpassing phishing (22%), insider threats (12%), and state-sponsored threat actors (10%).

The biggest rewards are coming from crypto and blockchain firms. They are offering the highest average overall rewards, and have handed out this year’s top payout of $100,050, the report states. Also, besides hunting for bugs, hackers are also engaged in pentesting (54%).

"Organizations are under pressure to adopt GenAI to stay ahead of competitors, which, in turn, is transforming the threat landscape. If you want to remain proactive about new threats, you need to learn from the experts in the trenches: hackers," said Chris Evans, HackerOne CISO and Chief Hacking Officer. 

"The Hacker-Powered Security Report makes clear that hackers are actively growing their skillsets to meet emerging threats. The versatility of hackers and the impact of the vulnerabilities they surface make them instrumental to how our customers anticipate and address risk.”

More from TechRadar Pro

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
ransomware avast
AI is helping hackers get access to systems quicker than ever before
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
A woman at a table using a Windows laptop, opposite sits a man, neither show their face
Microsoft will now pay you even more to find security bugs in Copilot
Cartoon Phishing
Hackers use GenAI to attack more frequently and effectively
Application Security Testing Concept with Digital Magnifying Glass Scanning Applications to Detect Vulnerabilities - AST - Process of Making Apps Resistant to Security Threats - 3D Illustration
Google bug bounty payments hit nearly $12 million in 2024
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras