Microsoft joins forces with HackerOne to boost bug bounties

Security researchers will be able to get their hands on the money before they're fixed

Bug bounty

Microsoft has revamped its hacker bounty programme, following a tie-up with hacker community HackerOne.

The partnership will speed up the time it takes for security researchers and non-malicious hackers to receive their payments after uncovering flaws in the company's Cloud, Windows and Azure DevOps environments.

The use of HackerOne not only means those finding vulnerabilities will get paid faster, they'll also be able to split their bounty and donate directly to charity from their rewards.

Bounties have been increased substantially too. If someone finds a flaw as part of the Windows Insider Preview, they can now be rewarded with money pots ranging from $15,000 up to $50,000. For those finding bugs in Microsoft's Cloud Bounty programme, rewards haven't experienced such a jump, but can receive up to $20,000 for their efforts.

Another way Microsoft is ensuring those finding bugs are getting the recognition they deserve is by ensuring they're paid as soon as the vulnerability has been reproduced and assessed rather than making them wait until a fix has been developed.

If an external party uncovers a vulnerability already known to Microsoft which has been identified by an internal team the individual submitting the flaw will receive the full bounty, rather than 10% of the eligibility as was previously the case. However, anyone else finding the problem after this will still only be rewarded with the 10%.

Microsoft's bounty programmes have so far paid security researchers more than $2,000,000 to help the company improve its products and services.

"Microsoft is committed to enhancing our Bounty Programs and strengthening our partnership with the security research community, and I look forward to sharing more updates and improvements in the coming months," said Jarek Stanley, senior program manager at Microsoft.

Featured Resources

Humility in AI: Building trustworthy and ethical AI systems

How humble AI can help safeguard your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Leadership compass: Privileged Access Management

Securing privileged accounts in a high-risk environment

Download now

Why you need to include the cloud in your disaster recovery plan

Preserving data for business success

Download now

Recommended

IBM: Hackers are targeting COVID-19 vaccine 'cold chain'
Security

IBM: Hackers are targeting COVID-19 vaccine 'cold chain'

3 Dec 2020
GitHub: Open source vulnerabilities can go undetected for four years
Security

GitHub: Open source vulnerabilities can go undetected for four years

3 Dec 2020
What is shoulder surfing?
Security

What is shoulder surfing?

2 Dec 2020
Security benefits of open virtualised RAN
Whitepaper

Security benefits of open virtualised RAN

2 Dec 2020

Most Popular

350,000 Spotify users hacked in credential stuffing attack
Security

350,000 Spotify users hacked in credential stuffing attack

24 Nov 2020
Samsung Galaxy Note might be discontinued in 2021
Mobile Phones

Samsung Galaxy Note might be discontinued in 2021

1 Dec 2020
IT Pro 20/20: Why tech can't close the diversity gap
Careers & training

IT Pro 20/20: Why tech can't close the diversity gap

1 Dec 2020