Right before Black Hat USA 2019, we announced our new researcher recognition program, and at Black Hat we announced the top researchers from the previous twelve months. Since it’s easier to track your progress with regular updates than with just an annual report, we are excited to announce the...
Earlier today we announced MSRC’s 2018-2019 Most Valuable Security Researchers at Black Hat. The following 75 researchers hail from all corners of the world and possess varied experience and skills, yet all of them have contributed to securing the Microsoft’s customers and the broader ecosystem...
Who’s going to be on the Most Valuable Security Researcher list at Black Hat USA 2019? We’re not announcing the names—yet—but this is how we’ll determine who’s there. How do we define the Most Valuable Security Researchers? The list at Black Hat will be the top tier of researchers based on not...
We’re getting close to Black Hat, and we hope to see you there. Here’s where you can find members of the Microsoft Security Response Center if you’d like to say hello, ask a question about a report you made, discuss a recent blog article, or just show us pictures of your dog. Wednesday, August 7...
We deeply appreciate the partnership of the many talented security researchers who report vulnerabilities to Microsoft through Coordinated Vulnerability Disclosure. We pay bounties for research in key areas, and each year at Black Hat USA, we’ve recognized the most impactful researchers helping...
There are many dedicated people and organizations who contribute to the protection and security of our common customers. For years, Microsoft has recognized security researchers for helping protect the ecosystem. Now, we’re announcing the launch of a new program to better recognize and thank...
This morning we are excited to unveil the security researcher leaderboard at the Black Hat Security Conference. This list recognizes the top security researchers who have contributed research to the Microsoft products and services. If you are curious on how we build the list, check out our...
I am very pleased to be releasing additional expansions of the Link Removed. Please stop by the Microsoft Networking Lounge at Black Hat, August 5-6, to learn more about these programs; or, visit Link Removed. We are raising the Bounty for Defense maximum from $50,000 USD to $100,000 USD. I am...
authentication
azure active directory
blackhat
bounty programs
bug bounty
community feedback
contest
defense bounty
las vegas
microsoft
microsoft account
networking lounge
online services
payouts
penetration testing
remoteapp
research community
sdl
security research
vulnerabilities
Two weeks ago I, along with 7,500 of my closest friends, attended the Black Hat security conference in Las Vegas, NV. I can’t speak for everyone, but I certainly had a great – if not exhausting – time while there. While there were a lot of great talks, a personal highlight for me each year is...
In a little less than 24 hours, we will award $200,000 to Jared DeMott, Ivan Frantic, or Vasilis Pappas as we name the inaugural winner of the BlueHat Prize – and we’ll award more than $50,000 for the two runners-up. As excitement builds towards that announcement, I was fortunate...
appreciation event
blackhat
bluehat prize
contest
finalists
ivan frantic
jared demott
microsoft
mitigation
research
response center
rop exploits
security
technology
vasilis pappas
One year ago this week we challenged the security community to take an unconventional focus on defensive innovation. We called that challenge the Link Removed due to 404 Error, and tomorrow night, we will award the grand prize of $200,000 to one of the finalists - Jared DeMott, Ivan Fratric, or...
Next Thursday (July 26), security researchers Mickey Shkatov and Toby Kohlenberg are scheduled to deliver a presentation at Black Hat USA 2012 hacker conference. There they will highlight weaknesses with a technology embedded into every Windows Vista or Windows 7 installation -- the Sidebar and...
Hello,
To mark the start of the 10-day countdown to the BlueHat Prize award ceremony, the MSRC Ecosystem Strategy Team is announcing the BlueHat Prize Question Sweepstakes that will give you a chance to win $5,000 at Black Hat this year! Be sure to check out the official announcement here and...
Hello,
The judges have finished reviewing the submissions for the first BlueHat Prize contest and the finalists are in! Please visit Link Removed due to 404 Error for details on the three finalists and their entries that mitigate return-oriented programming (ROP). The finalists will collectively...
"From the rise of retro fashion trends, art, music, and literature (as inspired by some great 21st century works of literature like "Pride and Prejudice and Zombies" and the complete stereo remastered works of The Beatles), I explore the notion of a Hacking Renaissance taking place today and...
1990s
anonymous
blackhat
computer security
corporate espionage
cultural critique
cybersecurity
digital privacy
ethical hacking
hackers
hacking
information security
internet
lulz security
malicious activity
nostalgia
online community
pop culture
society
white hat
BH Landscape
Next week, many of us here will be heading down to Las Vegas for Black Hat. The MSRC, and other teams in Microsoft, have been attending Black Hat for years. In fact, we've been sponsoring the show for the last eight years-the last five as a platinum sponsor. Some might ask why...
Two years ago, in front of a standing-room only crowd here at Black Hat, we introduced three new information sharing programs as well as the concept of Community-Based Defense. The underlying concept shared by all three programs was simple-collaboration will be key to preventing and defending...
Link Removed
Some of you might have seen today's story by Gregg Keizer of our sister publication Computerworld headlined "Link Removed due to 404 Error" and may have asked the same question I asked.
Two minutes?
Dutch hacker Peter Vreugdenhil broke into the current edition of the Web browser...
aslr
blackhat
browser
computerworld
cybersecurity
dep
exploit
hackers
hacking
internet explorer
memory protection
peter vreugdenhil
pwn2own
security
security patch
software industry
tipping point
vulnerability
white hat
windows 7