• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Bug Bounty Program Launched to Discover US Army Vulnerabilities

You are here: Home / General Cyber Security News / Bug Bounty Program Launched to Discover US Army Vulnerabilities

The Protection Digital Support (DDS) and HackerOne have introduced the launch of a new bug bounty application, in which contributors will endeavor to uncover vulnerabilities in the US Army’s electronic techniques.

This will be the 11th bug bounty method to consider position concerning the DDS and HackerOne, and the 3rd with the US Department of the Military, giving the likelihood for armed forces and civilian members to uncover vulnerabilities in trade for monetary benefits. It will run from January 6 to February 17 2021, and is named Hack the Army 3..

Participation is by invitation only to civilian hackers and members of the US army, with bug bounties supplied only to civilian hackers when legitimate security vulnerabilities are located according to the program policy.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Mcafee Total Protection 2021

Protect yourself against all threads using McAfee. Get McAfee Total Protection with 80% discount from our partner and an certified seller: SerialCart®.

➤ Activate Your Coupon Code


The function of the method is to emphasize security vulnerabilities in the US Army’s electronic property prior to they can be exploited by nefarious actors. These can then be secured to prevent profitable cyber-attacks getting position.

Brig. Gen. Adam C. Volant, US Military cyber-command director of operations commented: “Bug bounty programs are a special and productive ‘force multiplier’ for safeguarding critical Army networks, systems and details, and construct on the endeavours of our Military and DoD security specialists.

 “By ‘crowdsourcing’ solutions with the assist of the world’s greatest armed service and civilian ethical hackers, we enhance our existing security actions and offer an more signifies to detect and repair vulnerabilities. Hack the Military 3. builds upon the successes and lessons of our prior bug bounty packages.”

Marten Mickos, CEO of HackerOne, said: “We are living in a distinct environment right now than even just a calendar year in the past. Amid disinformation and a world wide wellbeing crisis, citizens are more and more wary of how, when and wherever their info is utilized. For yrs, the US Department of Defense and respective army branches have correctly strengthened their cybersecurity posture and guarded cherished facts by enlisting the assistance of ethical hackers on HackerOne. Yrs later on, hacker-run security is not only a best apply in the US armed service, but it is now a mandated prerequisite between civilian federal businesses. There is only a person way to secure our connected culture, together, and the US Army is major the cost with this most recent challenge.”

DDS has produced in depth use of bug bounty worries of this character to make improvements to security devices of US government departments. Since Hack the Pentagon was released again in 2016, it has executed 14 general public bounties on external-experiencing internet sites and apps in addition to 10 private bounties on sensitive inside methods in the US Office of Protection. These contain Hack the Pentagon, Hack the Defense Vacation System and Hack the Air Power.


Some sections of this article are sourced from:
www.infosecurity-journal.com

Previous Post: «Solarwinds Hackers Also Accessed U.s. Justice Department's Email Server SolarWinds Hackers Also Accessed U.S. Justice Department’s Email Server
Next Post: Over a Third of TMT Firms Hit by Security Breach in 2020 Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Big Tech Bans Social Networking App
  • Lack of Funding Could Lead to “Lost Generation” of Cyber-Startups
  • Unveiled: SUNSPOT Malware Was Used to Inject SolarWinds Backdoor
  • ‘I’ll Teams you’: Employees assume security of links, file sharing via Microsoft comms platform
  • DarkSide decryptor unlocks systems without ransom payment – for now
  • Researchers see links between SolarWinds Sunburst malware and Russian Turla APT group
  • Millions of Social Profiles Leaked by Chinese Data-Scrapers
  • Feds will weigh whether cyber best practices were followed when assessing HIPAA fines
  • SolarWinds Hack Potentially Linked to Turla APT
  • 10 quick tips to identifying phishing emails

Copyright © TheCyberSecurity.News, All Rights Reserved.