This week, we released the first Beta preview of the next version of Microsoft Edge. Alongside this, Microsoft is excited to announce the launch of the Microsoft Edge Insider Bounty Program. We welcome researchers to seek out and disclose any high impact vulnerabilities they may find in the next...
Earlier today we announced MSRC’s 2018-2019 Most Valuable Security Researchers at Black Hat. The following 75 researchers hail from all corners of the world and possess varied experience and skills, yet all of them have contributed to securing the Microsoft’s customers and the broader ecosystem...
Azure is exceptionally secure. To help keep it that way, we are doubling the top bounty reward for Azure vulnerabilities to $40,000. But we aren’t stopping there. To make it easier for security researchers to confidently and aggressively test Azure, we are inviting a select group of talented...
Who’s going to be on the Most Valuable Security Researcher list at Black Hat USA 2019? We’re not announcing the names—yet—but this is how we’ll determine who’s there. How do we define the Most Valuable Security Researchers? The list at Black Hat will be the top tier of researchers based on not...
We deeply appreciate the partnership of the many talented security researchers who report vulnerabilities to Microsoft through Coordinated Vulnerability Disclosure. We pay bounties for research in key areas, and each year at Black Hat USA, we’ve recognized the most impactful researchers helping...
Hyperledger executive director Brian Behlendorf and his team are working to advance cross-industry blockchain technologies through engaging enterprise developers.
Continue reading...
adoption
blockchain
collaboration
community
cross-industry
developers
digital
enterprise
hyperledger
innovation
investment
open source
projects
protocol
research
security
software
standards
technology
Earlier this week Link Removed brought together security researchers and hundreds of cybersecurity professionals from China and across Asia to explore the latest topics in cybersecurity research. Including presentations from Qihoo 360, Baidu, Alibaba and the Chinese Academy of Sciences, BlueHat...
awards
bluehat
bounty program
community
containers
cybersecurity
dynamics
emerging
engineering
github
iot
microsoft
msrc
partnership
research
security
shanghai
technology
vulnerabilities
There are many dedicated people and organizations who contribute to the protection and security of our common customers. For years, Microsoft has recognized security researchers for helping protect the ecosystem. Now, we’re announcing the launch of a new program to better recognize and thank...
awards
black hat
contributions
ecosystem
evangelism
indicator
information disclosure
mapp
microsoft
partners
programs
protection
recognition
research
response
security
strategist
threats
update
vulnerabilities
Original release date: May 02, 2019
Summary
The Cybersecurity and Infrastructure Security Agency (CISA) is issuing this activity alert in response to recently disclosed exploits that target unsecure configurations of SAP components. [1]
Technical Details
A presentation at the April 2019...
access control
acls
cisa
configuration
cybersecurity
exploit
internet exposure
message server
mitigation
network security
presentation
remote code execution
research
routing
sap
security best practices
security software
snc
system commands
vulnerabilities
Link Removed
In 2018 The Microsoft Bounty Program awarded over $2,000,000 to encourage and reward external security research in key technologies to protect our customers. Building on that success, we are excited to announce a number of improvements in our bounty programs to better serve the...
The Microsoft Security Response Center (MSRC) recently announced our first BlueHat security conference in Shanghai which will take place on May 29-30, 2019. After 15 years of BlueHat events in Redmond, Washington and Israel, we are thrilled to expand to a new location. We work with many talented...
Threat trends based on Trend Micros research and data protection network.
Mapping the Future: Dealing With Pervasive and Persistent Threats - Security Predictions - Trend Micro USA
Microsoft Corp. is releasing a service to help health-care companies move vast amounts of patient data to its cloud and connect with other related systems in a bid to offer clinicians, individuals and researchers a more comprehensive view of patient health.
Continue reading...
Last week at BlueHat’s “MSRC Listens” session, I took the stage with Mechele Gruhn, manager of the Vulnerability Response PM team, to explain how MSRC is changing our communication, workflows, and tooling to deliver an improved user experience for our partners in the security research community...
bluehat
bounty program
bounty terms
cfg
change logging
communication
community programs
evaluation
mitigation
msrc
research
security
submission
tools
transparency
user experience
vulnerability
workflow
This morning we are excited to unveil the security researcher leaderboard at the Black Hat Security Conference. This list recognizes the top security researchers who have contributed research to the Microsoft products and services. If you are curious on how we build the list, check out our...
At Black Hat USA each year, we unveil the Top 100 Security Researcher list to reflect the amazing engagement we get from the community. During this period, we had several thousand researchers engage with the Microsoft Security Response Center (MSRC). We appreciate all the partnership and...
2016
acknowledgements
annual report
blackhat usa
bounty for defense
community engagement
cybersecurity
industry collaboration
microsoft
mitigation bounty
msrc
researchresearch impact
research methodologies
research recognition
security researcher
security risks
severity rating
top 100
vulnerabilities
We have tabulated the results from April-June 2018. The Top 5 Bounty Hunters for Q4 are now in. As with our list from Q3, we want to recognize both the leaders in payouts and in number of successful submissions. We appreciate the hard work and dedication of the following individuals and...
april
ashar javed
awards
black hat
bounty hunters
bug bounty
cameron vincent
june
marcin towalski
microsoft
msrc
payouts
qihoo 360
recognition
research
security
security research
submission
top 5
vulcan team
Hey everyone — I hope this month’s blog post finds you well!
Today, we are welcoming the solstice in the U.S., and I am very much looking forward to summer in Seattle. In addition to some planned vacation time, I will also be working with our team and partners on some exciting product...
augmented reality
awe
blog
business applications
contextual data
digital transformation
edge
firstline workers
intelligent cloud
iot
june
microsoft
mixed reality
remote assistance
research
robotics
spatial planning
survey
update
workplace
Throughout the year, security researchers submit some amazing work to us under the Microsoft Bug Bounty program. Starting this quarter, we want to give a shout out to and acknowledge the hard work and dedication of the following individuals and companies who have contributed to securing...
ashar javed
awards
blackhat usa
bug bounty
cameron vincent
ecosystem
kai kang
mario gomes
microsoft
msrc
national cyber security centre
nick freeman
quarterly
research
security
submission
suresh chelladuri
top 5
yunhai zhang
yves jean avenard