O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

9 Top Bug Bounty Programs

856 visualizações

Publicada em

What companies have paid the most in bug bounties to date

Highest paid bounties and average bounty amount across top programs

How long it takes to respond, pay, and respond to reported vulnerabilities

Top hackers average number of hackers that have reported bugs across each program

Publicada em: Internet
  • Entre para ver os comentários

9 Top Bug Bounty Programs

  1. 1. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Bounty Average Bounty Paid Top Hacker RECENT REPORT
  2. 2. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  3. 3. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  4. 4. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  5. 5. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  6. 6.
  7. 7. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  8. 8. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  9. 9. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  10. 10. ● ●
  11. 11. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  12. 12. Gives security researchers clear guidelines for conducting vulnerability discovery activities directed at DoD web properties. Program Launched: Nov 2016 Response Time: 2 days Hackers Thanked: 360 If you have information related to security vulnerabilities of General Motors products and services, we want to hear from you. Program Launched: Jan 2016 Hackers Thanked: 98 Limited to security vulnerabilities in web applications owned by Adobe. Excludes desktop products. Program Launched: March 2015 Reports Resolved: 1,020 Hackers Thanked: 282 Wide scope of properties covering multiple brands, and tiered to bring focus to properties where bugs have more impact. Program Launched: Feb 2015 Reports Resolved: 2 days Hackers Thanked: 100

×