Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

HackerOne Paid $81 In Bug Bounty With Emergence of Bionic Hackers

Posted on October 3, 2025October 3, 2025 By CWS

HackerOne, a number one platform in offensive safety, introduced it has paid out a complete of $81 million in bug bounties to its world group of white-hat hackers over the previous 12 months.

This determine, detailed within the firm’s ninth annual Hacker-Powered Safety Report, marks a 13% improve from the earlier 12 months, highlighting the rising reliance on crowdsourced safety to defend in opposition to evolving cyber threats. The report covers the interval from July 1, 2024, to June 30, 2025.

The findings underscore a big return on funding for organizations using bug bounty packages. For each greenback spent on bounties, corporations saved a median of $15, culminating in an estimated $3 billion in mitigated monetary losses from potential breaches.

This 15x return demonstrates the monetary efficacy of leveraging moral hackers to determine and remediate vulnerabilities earlier than they are often exploited by malicious actors.

Emergence of “Bionic Hackers”

A central theme of the 2025 report is the emergence of the “bionic hacker” safety researchers who prolong their experience with synthetic intelligence.

This synergy of human creativity and AI-driven automation is reshaping the safety panorama. In response to HackerOne, there was a 210% surge in legitimate AI-related vulnerability reviews since 2024, with researchers more and more targeted on testing AI and machine studying techniques.

The report signifies that 67% of surveyed researchers now use AI or automation instruments to speed up reconnaissance and testing. The platform has additionally seen the appearance of “hackbots,” autonomous AI brokers which have submitted 560 legitimate reviews, primarily figuring out surface-level flaws like Cross-Web site Scripting (XSS).

Whereas human ingenuity stays essential for uncovering complicated enterprise logic and multi-step exploits, AI is proving to be a robust drive multiplier.

The distribution of the $81 million in bounties reveals key business priorities and threat areas. The expertise sector, significantly laptop software program and web companies, led in complete payouts.

Laptop Software program packages accounted for over $9.7 million in bounties, whereas the highest 10 packages on the platform paid out a mixed $21.6 million.

Vulnerability traits present a shift in focus. Whereas payouts for frequent bugs like XSS are declining, rewards for extra vital points resembling Improper Entry Management (IAC) and Insecure Direct Object Reference (IDOR) are on the rise.

IDOR-related rewards elevated by 23% and legitimate reviews grew by 29%, signaling that attackers and researchers are concentrating on authorization and entry management weaknesses.

The report emphasizes that the way forward for cybersecurity belongs to organizations that may successfully mix human experience with AI-powered instruments to remain forward of adversaries in a quickly altering menace atmosphere.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Bionic, Bounty, Bug, Emergence, HackerOne, Hackers, Paid

Post navigation

Previous Post: Oracle Confirms that Hackers Targeting E-Business Suite Data With Extortion Emails
Next Post: Hundreds of Free VPN Apps for Both Android and iOS Leaks Users Personal Data

Related Posts

20-Year-Old Vulnerability Allows Hackers to Control Train Brakes Cyber Security News
New XWorm V6 Variant Injects Malicious Code into a Legitimate Windows Program Cyber Security News
GPT-5 Jailbreaked With Echo Chamber and Storytelling Attacks Cyber Security News
Google Chrome 0-Day Vulnerability Exploited in the Wild Cyber Security News
Securing Multi-Cloud Infrastructures in 2025 Enterprise Deployments Cyber Security News
macOS ‘Sploitlight’ Vulnerability Let Attackers Steal Private Data of Files Bypassing TCC Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News