MASIGNCLEAN104

Barracuda Networks Said Hack Our Products Together With We'll Pay You Lot !

iklan banner

Barracuda Networks Tuesday announced it volition pay to a greater extent than than $3,100 to anyone who tin hack into its safety products, maxim the põrnikas bounty plan is the offset e'er from a pure-play safety vendor.

Barracuda Networks Tuesday announced it volition pay to a greater extent than than $3,100 to anyone who tin hack into its safety products, maxim the põrnikas bounty plan is the offset e'er from a pure-play safety vendor.
"This maiden reflects our commitment to our customers together with the safety community at large," says Paul Judge, main enquiry officeholder at Barracuda. The safety theatre lists its Spam & Virus Firewall, Web Filter, Web Application Firewall together with NG Firewall every bit products inwards its põrnikas bounty program.
Patch or nosotros become public, says põrnikas bounty plan  
Google last calendar week launched a bug-bounty plan to pay for vulnerabilities, together with many other vendors are willing to pay safety researchers for data nearly vulnerabilities they'd similar to live able to cook every bit presently every bit possible earlier these flaws are exploited every bit zero-day attacks
The Barracuda Networks bug-bounty plan volition pay every bit high every bit $3,133.70 -- an allusion to the slang "leet" number-related spelling of 31337 for safety "elite" --for "particularly severe bugs," according to the company. But the starting vantage is $500.
The next bugs together with assail types are said to live excluded: operate of automated testing tools; social engineering; denial-of-service attacks; physical attacks; attacks against Barracuda's customers; attacks against Barracuda's corporate infrastructure or present servers.
Acceptable põrnikas types  include "those that compromise confidentiality, integrity or authentication," amongst examples given of "remote exploits, privilege escalation, cross-site scripting, code execution together with ascendancy injection." The fellowship asks that vulnerabilities live reported via email to BugBounty@barracuda.com using the PGP cardinal at http://www.barracudalabs.com/bugbountypgp.txt.
To qualify for the põrnikas bounty, the põrnikas must live disclosed exclusively to the company, Barracuda specifies, together with 1 time the "issue is fixed, you lot volition live able to publicly give away the issue."
Share This :