NEW CARDING CHAT IN TELEGRAM

Red trust button: Bug Bounty gets an emergency brake

Man

Professional
Messages
2,828
Reputation
5
Reaction score
447
Points
83
A tool for controlling bug hunters increases business security.

A new feature has been introduced on the Standoff Bug Bounty platform, the "red button", which allows customers to pause bug bounty programs or cyber tests if the actions of researchers go beyond the established limits. The innovation is aimed at companies that explore critical cyberattack scenarios through APT Bug Bounty and cyber test formats.

In the context of the growing number of cyberattacks and the increasing complexity of their methods, Positive Technologies recommends that organizations implement effective approaches to cybersecurity. Bug bounty programs, especially APT Bug Bounty formats, provide independent researchers with access to infrastructure to find vulnerabilities, allowing businesses to assess the effectiveness of protection and quickly eliminate potential risks.

According to Alexey Novikov, Managing Director of Positive Technologies, the key stage of cybersecurity is the study of scenarios of unacceptable events. The new program stop feature is designed to increase the credibility of the bug bounty, making the research process more transparent and manageable.

Recording all actions of bug hunters through virtual desktops and the possibility of emergency termination of the attack are especially relevant for organizations that doubt the launch of such programs. Among the potential users of the innovation are government agencies, industrial enterprises and companies that need strict control over research.

Since the launch of the Standoff Bug Bounty in May 2022, more than 16 thousand researchers have registered on the platform, who have discovered almost 8000 vulnerabilities, of which 12% are critical. Total payments to bug hunters exceeded 148 million rubles. The new functionality can expand the range of participants and increase the number of companies ready to test their infrastructure through bug bounty.

Source
 
Top