Bug Bounty
U.S. Army Launches Hack the Army 3.0 Bug Bounty Program with HackerOne
The Defense Digital Service (DDS) and HackerOne announced the launch of the DDS’s latest bug bounty program with HackerOne. It is the eleventh program...
Bug Bounty
$100,000 Bounty Apple Zero-day Bug in “Sign in with Apple” Let Hackers Take Takeover of Apple User Accounts
Indian Security researcher found a critical Zero-day vulnerability in "Sign in with Apple" let hackers take over the third-party application accounts by just having...
Bug Bounty
HackerOne Paid $100 Million in Bug Bounties to Ethical Hackers
HackerOne declared that hackers have earned $100 million in bug bounties on the HackerOne platform.Hackers have become an essential part of the security environment....
Bug Bounty
Microsoft Offer $100,000 To Hack Azure Sphere Linux IoT OS Using RCE Exploits
The tech giant Microsoft has just announced a huge reward of $100,000 for hacking the Azure Sphere OS; it is the very first Linux-based...
Bug Bounty
Microsoft Launches XBOX Bounty Program Rewards Up to USD 20,000 for Critical Vulnerabilities
Microsoft launches XBOX Bounty Program, invites gamers, security researchers, and others around the world to find vulnerabilities in the Xbox Live network and services.The...
Bug Bounty
Pwn2Own 2019 – Ethical Hackers Earned $315,000 for Hacking Galaxy S10, Xiaomi Mi9, TP-Link and Netgear WiFi Router
In this first day, Ethical hackers earned $195,000 by exploiting the vulnerabilities that reside in the different products, In the second and final day...
Android
9 Android Zero-day Vulnerabilities Affects Billions of Android Devices – Hackers Perform DOS, RCE, Make, Deny & Spoof Calls
Exclusive research found 9 critical system-level Android VoIP Zero-day vulnerabilities that allow attackers to perform malicious operations, including denying voice calls, caller ID spoofing,...
Bug Bounty
Bug Bounty Program – Why Every Organization Needs One?
What Is A Bug Bounty Program?A Bug bounty program is also known as a vulnerability rewards program (VRP) is the one where security researchers...