Microsoft joins forces with HackerOne to boost bug bounties
Security researchers will be able to get their hands on the money before they're fixed
Microsoft has revamped its hacker bounty programme, following a tie-up with hacker community HackerOne.
The partnership will speed up the time it takes for security researchers and non-malicious hackers to receive their payments after uncovering flaws in the company's Cloud, Windows and Azure DevOps environments.
The use of HackerOne not only means those finding vulnerabilities will get paid faster, they'll also be able to split their bounty and donate directly to charity from their rewards.
Bounties have been increased substantially too. If someone finds a flaw as part of the Windows Insider Preview, they can now be rewarded with money pots ranging from $15,000 up to $50,000. For those finding bugs in Microsoft's Cloud Bounty programme, rewards haven't experienced such a jump, but can receive up to $20,000 for their efforts.
Another way Microsoft is ensuring those finding bugs are getting the recognition they deserve is by ensuring they're paid as soon as the vulnerability has been reproduced and assessed rather than making them wait until a fix has been developed.
If an external party uncovers a vulnerability already known to Microsoft which has been identified by an internal team the individual submitting the flaw will receive the full bounty, rather than 10% of the eligibility as was previously the case. However, anyone else finding the problem after this will still only be rewarded with the 10%.
Microsoft's bounty programmes have so far paid security researchers more than $2,000,000 to help the company improve its products and services.
"Microsoft is committed to enhancing our Bounty Programs and strengthening our partnership with the security research community, and I look forward to sharing more updates and improvements in the coming months," said Jarek Stanley, senior program manager at Microsoft.
Navigating the new normal: A fast guide to remote working
A smooth transition will support operations for years to comeDownload now
Putting a spotlight on cyber security
An examination of the current cyber security landscapeDownload now
The economics of infrastructure scalability
Find the most cost-effective and least risky way to scaleDownload now
IT operations overload hinders digital transformation
Clearing the path towards a modernised system of agreementDownload now