Hack the Pentagon 3.0 Bug Bounty Program to Focus on Facility Control Systems By Orbit Brain January 17, 2023 0 411 viewsCyber Security News House › ICS/OTHack the Pentagon 3.Zero Bug Bounty Program to Give attention to Facility Management MethodsBy Ionut Arghire on January 16, 2023TweetThe US Division of Protection (DoD) is on the point of launch the third installment of its ‘Hack the Pentagon’ bug bounty program, which is able to deal with the Facility Associated Controls System (FRCS) community.Hack the Pentagon was launched in 2016 on HackerOne, when the DoD invited moral hackers to seek out and report safety defects in Pentagon’s public net pages.In 2018, the DoD introduced a steady Hack the Pentagon program operating year-long on Bugcrowd and concentrating on vulnerabilities in {hardware} and bodily techniques and different high-value belongings.In keeping with a draft solicitation launched on Friday, as a part of Hack the Pentagon 3.0, DoD will depend on moral hackers to establish vulnerabilities in FRCS.The DoD’s FRCS consists of management techniques which might be used to observe and management gear and techniques associated to actual property amenities, reminiscent of HVAC, utilities, bodily safety techniques, and hearth and security techniques.“The general goal is to acquire assist from a pool of progressive data safety researchers by way of crowdsourcing for vulnerability discovery, coordination and disclosure actions and to evaluate the present cybersecurity posture of the FRCS community, establish weaknesses and vulnerabilities, and supply suggestions to enhance and strengthen the general safety posture,” the draft reads.Per the doc, the DoD is trying to interact with a personal group that has experience in industrial crowdsourcing, to pick “a personal neighborhood of expert and trusted researchers, which can be restricted to US individuals solely” to take part in this system.For earlier bug bounty applications – which additionally included Hack the Air Drive, Hack the Military, Hack the Marine Corps and Hack the Protection Journey System – along with working with HackerOne and Bugcrowd, the DoD partnered with Synack to vet collaborating researchers.The draft additionally makes it clear that the DoD will set up the eligibility standards for the collaborating researchers, and that individuals may have to have the ability to carry out reverse engineering, supply code evaluation, and community and system exploitation.“The bounty execution or ‘problem part’ itself is anticipated to final not more than 72 hours in individual,” the draft reads.Associated: DoD Launches ‘Hack US’ Bounties for Main Flaws in Publicly Uncovered PropertyAssociated: ‘Hack DHS’ Contributors Awarded $125,000 for Over 100 VulnerabilitiesAssociated: DoD Declares Outcomes of Vulnerability Disclosure Program for Protection ContractorsGet the Day by day Briefing Most LatestMost LearnResearchers: Brace for Zoho ManageEngine ‘Spray and Pray’ AssaultsInHand Industrial Router Vulnerabilities Expose Inside OT Networks to AssaultsWeb site of Canadian Liquor Distributor LCBO Contaminated With Net SkimmerHack the Pentagon 3.Zero Bug Bounty Program to Give attention to Facility Management MethodsCircleCI Hacked by way of Malware on Worker Laptop computerCybersecurity Specialists Forged Doubt on Hackers’ ICS Ransomware ClaimsNSA Director Pushes Congress to Renew Surveillance PowersMost Cacti Installations Unpatched Towards Exploited VulnerabilityExploitation of Management Net Panel Vulnerability Begins After PoC PublicationJuniper Networks Kicks Off 2023 With Patches for Over 200 VulnerabilitiesIn search of Malware in All of the Mistaken Locations?First Step For The Web’s subsequent 25 years: Including Safety to the DNSTattle Story: What Your Pc Says About YouBe in a Place to Act Via Cyber Situational ConsciousnessReport Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant2010, A Nice Yr To Be a Scammer.Do not Let DNS be Your Single Level of FailureLearn how to Establish Malware in a BlinkDefining and Debating Cyber WarfareThe 5 A’s that Make Cybercrime so EnticingLearn how to Defend Towards DDoS AssaultsSafety Budgets Not in Line with ThreatsAnycast – Three Causes Why Your DNS Community Ought to Use ItThe Evolution of the Prolonged Enterprise: Safety Methods for Ahead Considering OrganizationsUtilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous EnterpriseSecurityWeek Podcast bug bounty program DoD facility control system FRCS Hack the Pentagon Orbit Brainhttp://orbitbrain.com/ Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy waysand much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.
Social Blade Confirms Breach After Hacker Offers to Sell User DataIntroducing the Cyber Security News Social Blade Confirms Breach After Hacker Offers to Sell User Data.... December 16, 2022 Cyber Security News
Elon Musk Subpoenas Twitter Whistleblower Ahead of TrialIntroducing the Cyber Security News Elon Musk Subpoenas Twitter Whistleblower Ahead of Trial.... August 30, 2022 Cyber Security News
Edge Management and Orchestration Firm Zededa Raises $26 MillionIntroducing the Cyber Security News Edge Management and Orchestration Firm Zededa Raises $26 Million.... July 22, 2022 Cyber Security News
Researchers Crowdsourcing Effort to Identify Mysterious Metador APTIntroducing the Cyber Security News Researchers Crowdsourcing Effort to Identify Mysterious Metador APT.... September 27, 2022 Cyber Security News
Mississippi Creates New Cyber Unit, Names 1st DirectorIntroducing the Cyber Security News Mississippi Creates New Cyber Unit, Names 1st Director.... January 23, 2023 Cyber Security News
New Air Gap-Jumping Attack Uses Ultrasonic Tones and Smartphone GyroscopeIntroducing the Cyber Security News New Air Gap-Jumping Attack Uses Ultrasonic Tones and Smartphone Gyroscope.... August 24, 2022 Cyber Security News