Chrome 119 Patches 15 Vulnerabilities

November 1, 2023 at 10:23AM Google has released Chrome version 119, which includes patches for 15 vulnerabilities, with 13 of them reported by external researchers. Three bugs are rated as ‘high severity.’ Google has awarded $16,000 and $11,000 for the first two bugs respectively, with the amount for the third bug yet to be determined. … Read more

HackerOne paid ethical hackers over $300 million in bug bounties

October 28, 2023 at 02:18PM HackerOne, a bug bounty platform, has awarded over $300 million in rewards to ethical hackers since its inception. Thirty hackers have earned over $1 million, with one receiving $4 million for his bug reports. On average, it took organizations 25.5 days to resolve reported bugs this year, a 28% improvement. … Read more

Google Announces Bug Bounty Program and Other Initiatives to Secure AI

October 26, 2023 at 10:39AM Google has announced several initiatives to enhance the safety and security of AI. This includes a bug bounty program to reward researchers for identifying vulnerabilities in generative AI, a Secure AI Framework (SAIF) to protect critical components of machine learning, and a $10 million AI Safety Fund in collaboration with … Read more

Microsoft Debuts AI Bug-Bounty Program, Offers $15K

October 13, 2023 at 01:26PM Microsoft has introduced an AI bug-bounty program for researchers to identify vulnerabilities in its Bing generative AI chatbot and AI integrations. Rewards for eligible submissions range from $2,000 to $15,000. The program covers AI-powered Bing on bing.com, as well as integrations in Microsoft Edge, the Microsoft Start app, and Skype … Read more

Microsoft Offers Up to $15,000 in New AI Bug Bounty Program

October 13, 2023 at 06:18AM Microsoft has launched a bug bounty program specifically focused on vulnerabilities in its artificial intelligence (AI)-powered Bing search engine. The program offers rewards of up to $15,000 for vulnerabilities found in bing.com and associated applications. Microsoft is particularly interested in vulnerabilities related to inference manipulation, model manipulation, and inferential information … Read more