On Wednesday, the U.S. Air drive turned into the most recent division of the U.S. military to announce a public-facing bug bounty application. the program, Hack the Air drive, invites vetted white hat security experts to hack key public-going through Air force web sites.
The Air drive follows within the footsteps of Hack the military, announced in November, and the U.S. executive’s first public-going through computer virus bounty software Hack the Pentagon, launched in March 2016.
“we’re excited to partner with and mobilize one of the best talent from across the nation and our companions and provides them opportunities to serve and give a boost to our national protection,” stated Lisa Disbrow, acting secretary of the Air pressure in a prepared statement.
The initiative will likely be an invite-simplest software managed via HackerOne, which additionally ran Hack the Pentagon and Hack the army. The Air drive’s bounty application will make a selection from candidates from the U.S. and for the first time safety experts from outside the U.S. from international locations corresponding to the UK, Canada, Australia and New Zealand.
cash rewards for the program were not announced. then again, the Hack the Pentagon bug bounty program integrated greater than 1,four hundred registered hackers and paid out $ 75,000 in total bounties to an undisclosed selection of taking part hackers, consistent with the Air force.
The Hack the Air pressure initiative is a component of a Cyber stable marketing campaign sponsored by using the Air drive. interested participants should register through the program’s reliable HackerOne webpage beginning on may just 15. the competition runs from may just 30 to June 23. consistent with the Air force, financial rewards and the particular scope of the Hack the Air drive application gained’t be announced unless the problem starts on may just 30.
“this is the primary time the AF has opened up our networks to the sort of vast scrutiny,” said Peter Kim, chief information safety officer with the Air power. “we’ve got malicious hackers seeking to get into our methods daily. it is going to be good to have pleasant hackers taking a shot and, most importantly, displaying us the way to support our cybersecurity and safeguard posture.”
Kim said earlier public bug bounty applications run by using the U.S. government had been crucial when it got here to competing with firms akin to fb and Google for ability.
Kim made the announcement at a launch experience at HackerOne’s San Francisco headquarters on Wednesday.
Threatpost the primary stop for safety information
Facebook
Twitter
Instagram
Google+
LinkedIn
RSS