BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
US Charges 5 Suspected MGM Hackers from Scattered Spider Gang
/in General NewsFive alleged members of the notorious Scattered Spider hacking group have been charged with executing a sophisticated phishing…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Potential Trump cyber picks coalesce — but insiders say there could be surprises
/in General NewsA handful of names are being floated for key cyber positions by well-connected insiders and former high-ranking Trump officials, according to four people who spoke to Recorded Future News on the condition of anonymity to discuss the fluid deliberations.
The Record from Recorded Future News – Read More
Wiz acquires Dazz for $450M to expand its cybersecurity platform
/in General NewsWiz, one of the most talked-about names in the world of cybersecurity, is making a significant acquisition to expand its product reach in cloud security, particularly with developers. It is buying Dazz, a specialist in security remediation and risk management. Sources tell us the deal is valued at $450 million in a mix of cash […]
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
After CrowdStrike Outage, Microsoft Debuts ‘Quick Machine Recovery’ Tool
/in General NewsMicrosoft debuts Quick Machine Recovery tool to apply fixes even when machines are unable to boot, without needing physical access.
The post After CrowdStrike Outage, Microsoft Debuts ‘Quick Machine Recovery’ Tool appeared first on SecurityWeek.
SecurityWeek – Read More
Cybersecurity Is Critical, but Breaches Don’t Have to Be Disasters
/in General NewsThe future of cybersecurity isn’t about preventing every breach — it’s about learning and growing stronger with each attack.
darkreading – Read More
RSA’s Innovation Sandbox: Cybersecurity Startups Must Accept $5 Million Investment
/in General NewsThe owners of the RSA Conference will make a $5 million investment a prerequisite for all 10 finalists at next year’s Innovation Sandbox.
The post RSA’s Innovation Sandbox: Cybersecurity Startups Must Accept $5 Million Investment appeared first on SecurityWeek.
SecurityWeek – Read More
Wordware raises $30 million to make AI development as easy as writing a document
/in General NewsWordware, a San Francisco startup, raised $30 million to simplify AI development with a natural language platform, enabling non-coders to build AI agents without traditional programming.Read More
Security News | VentureBeat – Read More
A Look Back: Insights from Our Managed Bug Bounty Program
/in General NewsIntroduction
At Compass Security, we are proud to offer a fully managed bug bounty program tailored to the needs of both SMEs and larger enterprises. From scoping to payout, we manage every aspect of the process to ensure a seamless experience for our customers and valued hunters. In this blog post, we’ll take a look at our journey since the launch of our service in October 2023, highlighting key milestones, metrics and learnings gathered along the way.
We want to cut through the hype around bug bounty programs by publishing the real numbers, challenges and benefits in a transparent way.
From October 2023 onwards
Since October 2023, we have brought five customers on board, with more in the pipeline. Moreover, we are also eating our own dog food and running two programs, focusing on Compass Security’s infrastructure and the cyber training range developed by our sister company Hacking-Lab.
Specifically, we are very proud to be running the program for the European Organization for Nuclear Research (CERN), based in Meyrin (Geneva), which is probably the largest bug bounty program in Switzerland, next to Swisscom’s immense playground.
Let’s Talk Bounties
In total, hunters from all over the world have discovered over 30 valid bugs so far, resulting in a total payout of roughly CHF 15’000 and averaging at about CHF 500 per bug. Thirteen hunters have received payouts so far. The highest bounty paid was CHF 2’050.
So if you are considering launching a program you will find that it is not the masses that will jump on it and go after your scope but a few very dedicated hunters who will try to skim the cream . The set of criteria that hunters use to decide which program to jump on ranges from the novelty of the program, to scope, to maximum bounty payouts. We have learnt from discussions that European and Swiss hunters in particular will rarely invest their time in programs where the maximum bounty is below CHF 10’000. And we can confirm that most of the bounties we have paid have gone outside Europe. Mainly Asia and North America.
Key Metrics and Performance
Our managed programs received just over 200 reports in total. Some of the most interesting findings were subdomain takeover, account takeover, and exposure of sensitive resources. While most of the vulnerabilities were of low or medium severity, we also received a few high severity issues. Our triage process still varies in speed but is generally very fast. Payouts have also been very fast, but are occasionally affected by slow bank procedures. We have already built up a small community of hunters who submit new reports and keep us going.
With so many bugs, there are also many reports that do not qualify for a bounty.
Ineligible bugs are usually some form of report that either is no issue, has no real impact, lacks relevant proof or is defined in the program’s Rules of Engagement (RoE) as not being eligible for payment.
Duplicates, also known as collisions with Pwn2Own events, are bugs that have already been reported by another hunter and are therefore no longer eligible for a bounty. Understandably, this is one of the pain points and fears that come with bug hunting and puts pressure on hunters. Our general triage policy is to mark a report as duplicate if the same issue has already been reported and accepted for the same asset.
Most of the duplicates come from hunters smashing automated scanners at program scopes. Although we generally forbid scanning by program policy, some hunters still use it as an efficient means to perhaps grab some low hanging fruit or get an overview of the targets.
Beyond that, we sometimes get reports that are out of scope and address issues in assets that are not listed among our managed bug bounty programs, due to hunters not following the asset lists, mistakenly testing third-party services or excluded IP ranges, and for very human reasons such as typos in domain names.
Love From the Community
One of our hunters recently shared their positive experience with our bug bounty platform, praising our fast triage process and transparent payout system. His feedback underscores the importance of effective communication in building a respectful relationship that encourages continued collaboration.
This is where we are heading. Trust, transparency, kindness and respect for those who contribute to the success of the programs we manage.
Cost and Earnings
For most of our programs we currently take a flat fee for every eligible bug report we handle, hand over to the customer, provide guidance on fixing and track status. We use this flat rate to cover triage efforts and continuous development of our very basic reporting platform.
Yes, we do not charge for false positives, duplicates or out of scope issues. It is our promise to keep these away from our customers.
Bug Bounty Buyers Guide
If you are considering starting a bug bounty program, we suggest you stick to the concept. Money for bugs. So consider free subscriptions that take a flat fee per relevant report. *shameless plug*
Unless you have super specific needs for huge maximum bounties, multi-user and multi-language features, unparalleled marketing of your program, fully automated integration into the DevOps process or advanced vulnerability management, an annual subscription fee is hard to justify. As for our statistics, we have sent out five valid reports per program so far.
Do not overthink which platform to choose. The number of hunters and programs on a platform is not very relevant. Hunters have started to pull and aggregate programs on their own dedicated pages to get an overview on the latest changes that are relevant to them. What really matters is the attractiveness of your program. High bounties, wide open scope and a big variety of technology . This is what makes you an interesting target.
Hunters are essentially freelancers. They are an ingenious crowd and have an entrepreneurial mindset when it comes to finding and “acquiring” new projects with potential. What they are looking for is interesting technology, fair treatment and quick payment.
And that is what we aim for. To grow our platform with interesting and large scopes, but also to make sure that the money goes where the hard work is done. Quickly.
Conclusion
As we reflect on our journey, we’re grateful for the valuable insights we’ve gained from our customers and hunters. We remain committed to continuously improve, and leverage feedback to refine our processes. If you have comments or are curious about specific figures, get in touch.
If you want to join our sustainable bug bounty journey then you will find more information on our managed bug bounty service at Compass Security Bug Bounty or contact us at team@compass-security.com.
Compass Security Blog – Read More
How to select the best on-ramp and off-ramp for you?
/in General NewsChoosing the best on-ramp and off-ramp solutions is a key part of navigating the cryptocurrency landscape – to…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Financial Software Firm Finastra Investigating Data Breach
/in General NewsFinastra is investigating a data breach after a hacker claimed the theft of information from an internal file-transfer application.
The post Financial Software Firm Finastra Investigating Data Breach appeared first on SecurityWeek.
SecurityWeek – Read More