US Army Bug Bounty Program Fixes 118 Flaws

  /     /     /  
Publicated : 22/11/2024   Category : security


US Army Bug Bounty Program Fixes 118 Flaws


The Hack the Army program, sponsored by the US Army, received 400 bug reports and paid more than $100,000 to hackers who found 118 unique bugs.



Hack the Army, a bug bounty program launched by the US Army in November, received more than 400 bug reports in its three-week trial. Of these, 118 bugs were unique and could be fixed, reports Threatpost. White hat hackers and government employees were among 371 participants in the program, which paid upwards of $100,000.
We recognize we cannot continue to do business the way that we are, and that were not agile enough to keep up with things that are happening in the tech world, former Army Secretary Eric Fanning said while launching the program. There are people all over the world trying to get access to our sites, our data, our information, he added.  
One of the concerns involved goarmy.com. The website had two bugs that could be used in tandem to access the internal Department of Defense website sans password, due to poor routing security and a vulnerability within the system.
On its own, neither vulnerability is particularly interesting, but when you pair them together, its actually very serious, explained HackerOne, the platform for Hack the Army and Hack the Pentagon, an earlier government bug bounty program.
Read details on
Threatpost
.

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
US Army Bug Bounty Program Fixes 118 Flaws