Overcoming Microsoft's multi-layer authentication tool, you will receive up to $ 100,000
A new bonus search program has just been released by Microsoft with a maximum reward of up to $ 100,000 for anyone who can overcome the protection barrier of its multi-layer authentication tools.
Accordingly, Microsoft requires security researchers to find a flaw in the company's identity suite. Depending on the severity of the error detected, the bonus value will vary but will range from $ 500 to $ 100,000 for each error.
Microsoft said the bonus program is intended to help the company's engineers get to grips with existing security vulnerabilities as quickly as possible, thereby finding a way to fix the problem.
White-hat hackers will have to find ways to exploit vulnerabilities in some service login pages and Microsoft authentication applications (such as Microsoft Authenticator for Android and iOS).
List of Microsoft service login pages including:
- login.windows.net
- login.microsoftonline.com
- login.live.com
- account.live.com
- account.windowsazure.com
- account.activedirectory.windowsazure.com
- credential.activedirectory.windowsazure.com
- portal.office.com
- passwordreset.microsoftonline.com
After finding an error on the latest version of the application or service, the white-hat hacker will have to make a brief and concise presentation of the vulnerability and indicate the impact of the vulnerability on the user. send to the carrier. Microsoft will study and after confirming the error, the reward will be awarded.
Rules and ways to join the program, you can refer to the link below.
- https://www.microsoft.com/en-us/msrc/bounty-microsoft-identity?rtc=1
See more:
- Google awarded US $ 36,000 to the Uruguayan boy who discovered the carrier's serious security error
- Vietnamese security engineer was awarded by Yahoo for discovering a serious vulnerability on Yahoo Messenger
- Facebook awards 1 billion VND for those who find new data holes
- Microsoft rewards $ 250,000 for any talent that discovers the new Meltdown and Specter vulnerabilities
You should read it
- Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
- Microsoft account enhances two-layer security
- 5 Multi-Factor Authentication Vulnerabilities and how to fix them
- Microsoft patched 6 zero-day vulnerabilities in Windows 10
- Microsoft Edge has more features to help limit zero-day exploits
- Deploy multi-factor authentication to remote Microsoft Teams users
- How to Become a Microsoft MVP
- Microsoft introduced a tool to fix security holes in IE 9 and 10
May be interested
- How to turn on two-factor authentication to protect your Firefox accountmozilla has begun implementing two-factor authentication (2fa) in firefox accounts. enabling this feature on the account will add security layer by requesting verification before logging in. this means that even someone who knows the password cannot access your account.
- How to get free games on Epic Games Storeto receive free games on the epic games store, users need to turn on 2-layer security by email, text or through a 2-layer authentication application.
- Activate 2-layer verification to secure your Apple ID accountto protect users from hacker attacks, apple has integrated 2-layer security on its devices. both 2-layer verification security and 2-step verification security are available for apple id users. however, the 2-layer verification security feature and 2-step verification security feature are slightly different.
- More than 90% of Gmail users still don't use the two-factor authentication featurea google engineer has revealed that more than 90 percent of active gmail accounts do not use two-factor authentication (2fa), according to a report from the register.
- 5 secure password alternatives you should considerwith the rise of cyberattacks targeting password-based authentication and serious data breaches, passwords don't seem like a safe solution anymore.
- Enhance security with multi-layer defense systemone concern now is that the number of annual security threats increases dramatically, and above all, current security threats are constantly changing, developing and morphing. .
- Multi-factor authentication in Windows - Part 1: USB tokens and smart cardsuntil now, passwords were often used as a required authentication mechanism or it was a preferred mechanism when accessing sensitive systems and data. however, due to security needs, it requires more and more convenience, reducing the complexity and need to implement it
- How to create 2-step authentication code onlinetwoblocks is a website that generates two-step authentication codes without using a utility or installation software.
- Typical examples of spirit overcoming fatethere are many examples of overcoming difficulties on the internet. this article will summarize for you examples of overcoming your own fate to see that in this life, nothing is impossible.
- Google now allows G Suite administrators to disable unsafe 2FA authenticationgoogle recently added a new dashboard option to g suite administrators (admin console), designed to help administrators have the right to disable phone options as a two-factor authentication method ( 2fa) for g suite accounts in their domain, preventing users from using sms and voice codes when authenticating.