» » Microsoft Paid $13.7 Million via Bug Bounty Programs Over Past Year

Microsoft Paid $13.7 Million via Bug Bounty Programs Over Past Year

Microsoft Paid $13.7 Million via Bug Bounty Programs Over Past Year

Dwelling › Vulnerabilities

Microsoft Paid $13.7 Million by way of Bug Bounty Applications Over Previous 12 months

By Ionut Arghire on August 12, 2022

Tweet

Microsoft this week introduced that, over the previous 12 months alone, it paid out $13.7 million in rewards as a part of its bug bounty applications.

The tech big is at present operating over 15 bug bounty applications overlaying property throughout its cloud providers, desktop functions and working techniques, and confidentiality and virtualization options, together with a program overlaying the ElectionGuard open supply software program improvement equipment (SDK).

Safety researchers thinking about collaborating in Microsoft’s bug bounty applications could earn rewards of as much as $250,000 for critical-severity vulnerabilities in Hyper-V that might result in distant code execution, info disclosure, or denial of service (DoS).

In reality, the one greatest payout that Microsoft handed out between July 1, 2021, and June 30, 2022, was of $200,000, awarded for a essential flaw within the Hyper-V hypervisor.

Through the 12-month interval, greater than 330 safety researchers acquired rewards by way of Microsoft’s bug bounty applications, for a mean payout of greater than $12,000.

Microsoft says it’s evolving its bug bounty applications primarily based on suggestions from researchers. This yr, the corporate launched throughout its applications a brand new analysis problem and new high-impact assault situations.

New additions and updates embody an Azure SSRF problem, Android and iOS being added to the Edge bounty program, a recognition program for researchers, the addition of on-premises Trade, SharePoint, and Skype for Enterprise to the bug bounty program, and expanded Azure, M365, and Dynamics 365 and Energy Platform bounty applications with high-impact situations.

“The addition of those assault situations to our Azure, Dynamics 365 and Energy Platform, and M365 bounty applications helps to focus analysis on the very best impression cloud vulnerabilities together with areas like Azure Synapse Analytics, Key Vault, and Azure Kubernetes Providers,” Microsoft notes.

Associated: Microsoft Patches 128 Home windows Flaws, New Zero-Day Reported by NSA

Associated: Microsoft Provides Groups Cell Purposes to Bug Bounty Program

Associated: Microsoft Launches ElectionGuard Bug Bounty Program

Get the Every day Briefing

 
 
 

  • Most Latest
  • Most Learn
  • Killnet Releases ‘Proof’ of its Assault In opposition to Lockheed Martin
  • US Authorities Shares Photograph of Alleged Conti Ransomware Affiliate
  • CISA, FBI Warn Organizations of Zeppelin Ransomware Assaults
  • Microsoft Paid $13.7 Million by way of Bug Bounty Applications Over Previous 12 months
  • Realtek SDK Vulnerability Exposes Routers From Many Distributors to Distant Assaults
  • FTC Guidelines to Corral Tech Companies’ Knowledge Assortment
  • Safety Researchers Dig Deep Into Siemens Software program Controllers
  • Zero-Day Vulnerability Exploited to Hack Over 1,000 Zimbra E mail Servers
  • Black Hat USA 2022 – Bulletins Abstract
  • Intel Introduces Safety In opposition to Bodily Fault Injection Assaults

Searching for Malware in All of the Improper Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Laptop Says About You

Be in a Place to Act By means of Cyber Situational Consciousness

Report Reveals Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice 12 months To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

The way to Determine Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Enticing

The way to Defend In opposition to DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles