Archive for the ‘Hack the Pentagon’ Category

Hack the Army Bounty Pays Out $100,000; 118 Flaws Fixed

January 20th, 2017

The U.S. Army released the results of its Hack the Army bug bounty, and said that close to $100,000 was paid out, and 118 unique and actionable vulnerabilities were reported.

Posted in bug bounties, bug hunting, Eric Fanning, Government, Hack the Army, Hack the Pentagon, HackerOne, vulnerabilities | Comments (0)

DoD Publishes Vulnerability Disclosure Policy

November 22nd, 2016

In the wake of the Pentagon and Army bug bounties, the government continues to engage researchers with the publication of the DoD’s vulnerability disclosure program.

Posted in ash carter, Department of Defense, Government, Hack the Army, Hack the Pentagon, HackerOne, security research, vulnerabilities, Vulnerability Disclosure, Wassenaar Arrangement | Comments (0)

Army Bug Bounty Building New Relationships with Hackers

November 14th, 2016

The government announced its second bug bounty program called Hack the Army, which will concentrate on finding bugs in recruiting websites and databases.

Posted in bug bounty, Department of Defense, disclosure, Eric Fanning, Government, Hack the Army, Hack the Pentagon, HackerOne, Katie Moussouris, vulnerabilities, Web Security | Comments (0)

Meet the 18-Year-Old Who Hacked the Pentagon

June 21st, 2016

The Department of Defense last week released the results of the first Hack the Pentagon bounty program and 18-year-old David Dworken was among those who participated.

Posted in bug bounty, content injection vulnerabilities, Cross site scripting, David Dworken, Department of Defense, Government, Hack the Pentagon, HackerOne, vulnerabilities, Web Security | Comments (0)

138 security flaws in US defense websites uncovered in Hack the Pentagon

June 21st, 2016

Results are in from the US Defense Department’s pilot “Hack the Pentagon” bug bounty initiative.

Posted in Bug Bounty Program, Hack the Pentagon, Law & order, Pentagon, Security threats, U.S defense, Vulnerability | Comments (0)

Hack the Pentagon: Hackers find over 100 Bugs in U.S. Defense Systems

June 14th, 2016

The “Hack the Pentagon” bug bounty program by the United States Department of Defense (DoD) has been successful with more than 100 vulnerabilities uncovered by white hat hackers in Pentagon infrastructure.

In March, the Defense Department launched what it calls “the first cyber Bug Bounty Program in the history of the federal government,” inviting hackers to take up the challenge of

Posted in bug bounty, Department of Defense, Hack the Pentagon, HackerOne, hacking news, United States, Whitehat Hacker | Comments (0)

Katie Moussouris on Hack the Pentagon, Embracing Hackers

April 14th, 2016

Mike Mimoso talks to Katie Moussouris about her newly launched consultancy Luta Security, the Hack the Pentagon bug bounty program, and more.

Posted in bug bounties, disclosure, Hack the Pentagon, Katie Moussouris, Luta Security, Mike Mimoso, Podcasts, vulnerabilities | Comments (0)

Hack the Pentagon an Olive Branch to Security Researchers

April 7th, 2016

At Infiltrate Conference, the DOD explained more about the Hack the Pentagon bug bounty program and how government attitudes about hackers are shifting.

Posted in Department of Defense, Government, Hack the Pentagon, HackerOne, Infiltrate Conference, Lisa Wiswell, Pentagon bug bounty, vulnerabilities | Comments (0)

DARPA Invites Geeks to Convert Everyday Objects into Deadly Weapons

March 17th, 2016

Do you know that your daily household items can be turned into deadly weapons?

Yes, it’s possible to convert some of your everyday household appliances into explosives, weapons or surveillance devices.

DARPA – the agency which does research in various fields for improving the US Military and US Department of Defense capabilities – had announced a new project dubbed “Improv” to transform

Posted in DARPA, Hack the Pentagon, Improv, Internet of things, spying tool, surveillance tool, Weapons | Comments (0)

“Hack the Pentagon” bug bounty program announced

March 7th, 2016

First, we vet you, the US says. Then, keep your hands where we can see them. Now we’re just like the cool tech companies!

Posted in bug bounty, Bug Bounty Program, DOD, Hack the Pentagon, Law & order, Security threats, US Department of Defense, Vulnerability | Comments (0)