March 22, 2017 By Douglas Bonderud 2 min read

Bug bounty programs work. It makes sense: White-hat hackers of all stripes and skill levels get a chance to track down critical flaws, improve their security reputation and get paid.

Dark Reading noted these programs are quickly “growing up,” offering bigger payouts and using a more formal approach to determine vulnerability values. Here’s a look at the maturing market of big league bug squashing.

The Rise of Bug Bounty Programs

Crowdsourcing the bug-hunt business is a solid choice for big tech companies. Even with large IT staff, it’s impossible to invest the kind of time and effort necessary to track down both existing and zero-day flaws. Add in the fact that familiarity with local systems makes in-house IT less than impartial, and there are big benefits to bug finding.

So it’s no surprise that the market is growing. ZDNet reported that Intel just launched its first bug bounty program. Payouts are $7,500 for critical software bugs, $10,000 for critical firmware security flaws and up to $30,000 for each “critical Intel hardware bug.”

Meanwhile, companies like HackerOne and Bugcrowd, which manage bounty programs for other organizations, are seeing a marked increase in the number of registered hackers, according to Dark Reading. HackerOne in particular has more than 100,000 people on board, and has helped 750 organizations find 40,000 bugs.

Results come quickly — more than 75 percent of companies that sign up with HackerOne get at least one bug report within 24 hours. Even companies with long-standing bounty programs, such as Microsoft, are increasing their payouts. If participants find zero-day vulnerabilities that Microsoft can replicate, the rewards reach $15,000 or more.

Locking It Down

Along with bigger payouts, companies are also tightening up the formula they use to assign bug values. What’s the math behind all the money?

CSO Online explained that it’s critical for companies to define what a bug is worth — and be prepared to change this number as market forces shift. Dark Reading also pointed to several key factors in “formalizing” bug bounty programs to pay out more when specific conditions are met. For example, HackerOne takes into account the severity of the flaw, the scarcity or abundance of similar bugs, the potential impact of the vulnerability in the wild and the maturity of a company’s existing security program.

What does this mean for bug hunters? Low-risk flaws that are common across industries, won’t lead to severe data breaches and can be effectively handled by internal teams will pay out on the low end of the spectrum: likely between $1,000 and $5,000. On the higher end, rare, risky and repeatable bugs that put corporate resources in jeopardy could net anywhere from $15,000 to $100,000.

The bottom line is that bug bounty programs, both internal and managed, are maturing as corporate risk increases. They are also becoming increasingly structured as more hackers lend their squashing skills to protect corporate data.

More from

Skills shortage directly tied to financial loss in data breaches

2 min read - The cybersecurity skills gap continues to widen, with serious consequences for organizations worldwide. According to IBM's 2024 Cost Of A Data Breach Report, more than half of breached organizations now face severe security staffing shortages, a whopping 26.2% increase from the previous year.And that's expensive. This skills deficit adds an average of $1.76 million in additional breach costs.The shortage spans both technical cybersecurity skills and adjacent competencies. Cloud security, threat intelligence analysis and incident response capabilities are in high demand. Equally…

Cyberattack on American Water: A warning to critical infrastructure

3 min read - American Water, the largest publicly traded United States water and wastewater utility, recently experienced a cybersecurity incident that forced the company to disconnect key systems, including its customer billing platform. As the company’s investigation continues, there are growing concerns about the vulnerabilities that persist in the water sector, which has increasingly become a target for cyberattacks. The breach is a stark reminder of the critical infrastructure risks that have long plagued the industry. While the water utility has confirmed that…

What’s behind unchecked CVE proliferation, and what to do about it

4 min read - The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizations' cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified.Meanwhile, Coalition's 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit 34,888—a 25% increase compared to the previous year. This upward trend presents a significant challenge for organizations trying to manage vulnerabilities and mitigate potential exploits.What’s behind…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today