• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google doubles bug bounty rewards for linux, kubernetes exploits

Google doubles bug bounty rewards for Linux, Kubernetes exploits

You are here: Home / General Cyber Security News / Google doubles bug bounty rewards for Linux, Kubernetes exploits
February 16, 2022

Getty Pictures

Google has introduced it will be doubling the benefits it delivers to bug hunters who can exhibit performing exploits for a variety of zero-working day and one-working day vulnerabilities across a variety of platforms. 

The reward increases will be applied to exploits discovered in the Linux Kernel, Kubernetes, Google Kubernetes Engine (GKE), or kCTF (Kubernetes-dependent infrastructure for capture the flag exercise routines), with the up coming overview coming at the start out of 2023.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Rewards supplied for valid 1-working day security exploits increase by far more than double to a greatest of $71,337, up from $31,337 beforehand. In some cases recognized as ‘n-days’, one particular-days are publicly identified vulnerabilities that have patches for them, but Google will supply benefits for novel exploits in this situation.

Bug hunters searching for benefits for valid a person-day exploits will have to offer a url to the present patch in their report. Google also reported it will be limiting the range of rewards for one-day vulnerabilities to only a single model or make.

“There are 12-18 GKE releases per 12 months on just about every channel, and we have two clusters on various channels, so we will pay out the $31,337 base benefits up to 36 periods (no restrict for the bonuses),” mentioned Eduardo Vela, Products Security Response TL/M at Google. “Although we you should not assume just about every update to have a valid 1day submission, we would really like to discover usually.”

Valid exploits for beforehand mysterious zero-day vulnerabilities will approximately double to a optimum reward of $91,337, up from $50,337 earlier. Zero-working day vulnerabilities usually entice larger benefits due to the fact any provided vendor would often want to safe the weakness prior to information of it at any time achieved cyber criminals.

“We introduced an growth of kCTF VRP on 1 November 2021 in which we paid out $31,337 to $50,337 to those that are ready to compromise our kCTF cluster and get hold of a flag,” stated Vela. “We elevated our rewards for the reason that we recognised that in get to appeal to the consideration of the group we essential to match our rewards to their expectations. We consider the growth to have been a achievements, and mainly because of that, we would like to extend it even even further to at the very least until eventually the end of the 12 months (2022).”

An growing amount of money of latest study has highlighted cyber criminals’ shift in target toward Linux environments, both in and outside the house of the cloud. 

Qualys printed conclusions earlier this year with regards to a Linux root privilege flaw that went unnoticed for 12 a long time when “hiding in basic sight”, though VMware noticed an rising amount of ransomware attacks focusing on Linux-dependent multi-cloud environments past week.

Total information on the reporting process can be uncovered in the Google website publish.

Reward construction

Google will offer you a foundation reward of $31,337 for the first valid exploit for a provided vulnerability, zero-day or 1-working day. This will only be paid out the moment per vulnerability and the moment for every cluster edition or make. Duplicate exploits will not be awarded unless of course it provides a novel exploit chain, Google mentioned.

From there, a full of three bonuses of $20,000 are accessible depending on the character of the exploit disclosed. 

  • $20,000 will be awarded if the exploit is a zero-day
  • A further $20,000 will be awarded for exploits that do not call for unprivileged user namespaces
  • An additional $20,000 is on provide to individuals who can demonstrate novel exploit methods. This also applies to duplicate exploits and Google needs a full publish-up to qualify as a legitimate submission

Some parts of this article are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News Finance Officer Jailed After Stealing £200,000 from Charity
Next Post: VMware Issues Security Patches for High-Severity Flaws Affecting Multiple Products vmware issues security patches for high severity flaws affecting multiple products»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Malicious PyPI Packages Use Compiled Python Code to Bypass Detection
  • New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
  • The Importance of Managing Your Data Security Posture
  • Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering
  • Insurers Predict $33bn Bill for Catastrophic “Cyber Event”
  • Chinese Phishing Gang “PostalFurious” Expands Campaign
  • Kaspersky Says it is Being Targeted By Zero-Click Exploits
  • North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks
  • MOVEit Transfer Under Attack: Zero-Day Vulnerability Actively Being Exploited
  • Horabot Campaign Targets Spanish-Speaking Users in the Americas

Copyright © TheCyberSecurity.News, All Rights Reserved.