• Disclosure
  • Privacy Policy
  • DMCA Policy
  • CCPA
  • Medical Disclaimer
Friday, March 31, 2023
Comal County News Online
  • Home
  • News
  • Business
  • Technology
    • Crytpocurrency
    • Gaming
    • Gadgets
  • Sports
  • Health
  • General
    • Business Services
  • Travel
  • Press Releases
  • Popular
No Result
View All Result
  • Home
  • News
  • Business
  • Technology
    • Crytpocurrency
    • Gaming
    • Gadgets
  • Sports
  • Health
  • General
    • Business Services
  • Travel
  • Press Releases
  • Popular
No Result
View All Result
No Result
View All Result
Home News

US Government To Offer Up To $5,000 ‘bounty’ To Hackers To Identify Cyber Vulnerabilities – CNN

by NewsReporter
December 15, 2021
in News
us-government-to-offer-up-to-$5,000-‘bounty’-to-hackers-to-identify-cyber-vulnerabilities-–-cnn
Share on FacebookShare on Twitter

(CNN)The Department of Homeland Security is launching a “bug bounty” program, potentially offering thousands of dollars to hackers who help the department identify cybersecurity vulnerabilities within its systems.

DHS will pay between $500 and $5,000 depending on the gravity of the vulnerability and the impact of the remediation, Homeland Security Secretary Alejandro Mayorkas announced Tuesday.

“It’s a scalable amount of money but we consider that quite significant,” he said, speaking at the Bloomberg Technology Summit. “We’re really investing a great deal of money, as well as attention and focus, on this program.”

    Hackers will earn the highest bounties for identifying the most severe bugs, DHS said.

      Some private companies offer much higher bounties for uncovering vulnerabilities. For instance, payouts from Apple range from $25,000 to $1 million and Microsoft offers up to $200,000.

        US warns hundreds of millions of devices at risk from newly revealed software vulnerability

        The announcement comes a day after senior Biden administration cyber officials warned that hackers are exploiting a newly revealed software vulnerability.

        The vulnerability is in Java-based software known as “Log4j” that large organizations, including some of the world’s biggest tech firms, use to configure their applications.

          Jen Easterly, director of the DHS Cybersecurity and Infrastructure Security Agency, said the “vulnerability is one of the most serious that I’ve seen in my entire career, if not the most serious,” during a call with executives from major US industries Monday.

          As part of the “Hack DHS program,” the department will verify the vulnerability within 48 hours and either remediate it within 15 days or, if required, develop a plan for remediation within a 15-day period, according to Mayorkas.

          The program will be open to vetted cybersecurity researchers who have been invited to access select external DHS systems.

          “Hack DHS” will be carried out in three phases. First, hackers will conduct virtual assessments, which will be followed by a live, in-person hacking event. During the third phase, DHS will identify and review lessons learned and plan for future bug bounties, according to the department.

          Asked whether this program will last into future administrations, Mayorkas said that if it proves valuable, “we will continue the program for as long as we can.”

          Katie Moussouris, CEO and founder of Luta Security, welcomed the move but raised concerns about the program’s timeline.

          Ransomware attack hits Virginia Legislature

          “It’s great that DHS is working with hackers and welcoming their findings; however, time-bound bug bounty programs do not deliver consistent security improvements,” she told CNN. “It’s time to mature government vulnerability disclosure and bug bounty programs towards measurable security outcomes.”

          She also pointed out that bug bounties are meant to catch what internal security due diligence missed.

          “I will be interested to see if this newest bug bounty reveals more complex bugs than typical low-hanging fruit normally found in bug bounties,” she added. The department ran a bug bounty pilot program in 2019, which stemmed from legislation that allows DHS to compensate hackers for evaluating department systems. It also build on similar efforts, like the Department of Defense’s “Hack the Pentagon” program.

          Casey Ellis, founder and chief technology officer at Bugcrowd, a San Francisco-based cybersecurity firm that is working with DHS on the bug bounty program, said there are benefits to adding outside expertise to the department’s cybersecurity efforts.

          “It takes an army of allies to outsmart an army of adversaries. Even with an internal team as resourced and smart as the DHS, adding the collective creative of the good-faith hacker community helps DHS level the playing field against the adversary.”

          Bugcrowd has been advising a variety of government agencies for many years, including DHS, and will be the platform partner for this program.

          Democratic Sen. Maggie Hassan of New Hampshire and Republican Sen. Rob Portman of Ohio, who helped draft the initial bug bounty legislation, praised the announcement.

            “At a time when cyber threats are on the rise, I’m pleased that DHS is making permanent the bug bounty program I created with Senator Hassan to ensure our federal government is better prepared to protect itself,” Portman said in a statement.

            This story has been updated with more comments.

            CNN’s Sean Lyngaas contributed to this story.

            Related Posts

            gearhead-enjoys-piecing-cars-back-together-|-community-alert-|-herald-zeitung.com-–-herald-zeitung

            Gearhead Enjoys Piecing Cars Back Together | Community Alert | Herald-Zeitung.com – Herald Zeitung

            by NewsReporter
            April 14, 2022
            0

            “It doesn’t matter if you are 16, 22, 40, 82 or 90. Everybody loves a Ford Mustang.”That is just one of the many observations Doyle Marshall has made regarding Americans and their love of automobiles. Doyle knows a thing or two about cars. He serves as co-chair of the New...

            Ukrainians Face New Hurdle At U.S. Border: No Dogs – The New York Times

            by NewsReporter
            April 14, 2022
            0

            Please enable JS and disable any ad blocker

            perspective-|-here’s-how-the-us.-should-respond-to-any-russian-cyberattacks-–-the-washington-post

            Perspective | Here’s How The U.S. Should Respond To Any Russian Cyberattacks – The Washington Post

            by NewsReporter
            April 14, 2022
            0

            Placeholder while article actions loadRussian cyberattacks may be coming. Last month, the White House issued its starkest warning yet that “evolving” intelligence indicates Moscow is planning major cyber operations against the United States in retaliation for the economic penalties that the country has imposed on Russia for its invasion of...

            100-club-of-comal-county-honors-late-sheriff,-constable-remembered-for-their-long-time-service-–-herald-zeitung

            100 Club Of Comal County Honors Late Sheriff, Constable Remembered For Their Long-Time Service – Herald Zeitung

            by NewsReporter
            April 13, 2022
            0

            End of watch for two late county lawmen was one of the most poignant highlights of the 100 Club of Comal County’s annual dinner, attended by hundreds Tuesday night at the New Braunfels Civic/Convention Center.Criminal District Attorney Jennifer Tharp paid homage to both legends whose long-time county service was celebrated...

            Comal County News Online

            © 2021 Comal County News Online

            Navigate Site

            • Disclosure
            • Privacy Policy
            • DMCA Policy
            • CCPA
            • Medical Disclaimer

            Follow Us

            No Result
            View All Result
            • Home
            • DMCA Policy
            • Medical Disclaimer
            • Privacy Policy
            • Disclosure
            • CCPA
            • Terms of Use

            © 2021 Comal County News Online

            We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
            Cookie SettingsAccept All
            Manage consent

            Privacy Overview

            This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
            Necessary
            Always Enabled
            Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
            CookieDurationDescription
            cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
            cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
            cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
            cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
            cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
            viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
            Functional
            Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
            Performance
            Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
            Analytics
            Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
            Advertisement
            Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
            Others
            Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
            SAVE & ACCEPT