Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Offered K+ to Sever Ring from Amazon Cloud

Hackers Offered $10K+ to Sever Ring from Amazon Cloud

Posted on February 24, 2026 By CWS

A new bug bounty program is offering hackers over $10,000 to successfully disconnect Ring Video Doorbells from Amazon’s cloud infrastructure while maintaining device functionality. This initiative, aimed at improving data privacy for users, encourages the development of local storage solutions.

Privacy-Driven Bounty Program

The bounty targets models released from 2021 onwards, challenging participants to devise software solutions that enable local control of the devices. The total bounty fund currently stands at $17,924, accumulated through public donations and a matching fund. The objective is to ensure Ring doorbells can operate independently of Amazon’s cloud, connecting directly to a local server via Wi-Fi or a physical connection.

Modifications must not involve hardware replacement and should be achievable with low-cost, accessible tools. Participants must also provide clear instructions that allow users with moderate technical skills to implement the solution within an hour.

Technical Requirements and Compliance

Participants are required to maintain all existing hardware capabilities of the Ring doorbells, such as motion detection and color night vision. Additionally, the solution should ideally support integration with Home Assistant platforms. The bounty is open to anyone who can meet these outlined criteria and the overarching terms set by FULU.

The initiative reflects the growing concern over Ring’s data management practices, particularly in light of past privacy issues. In 2024, Ring settled a $5.6 million complaint with the Federal Trade Commission regarding unauthorized access to user videos by employees and unpatched vulnerabilities compromising 55,000 accounts.

Deadline and Future Outlook

Interested developers have until December 31, 2031, to submit their solutions to FULU. If no viable modification is presented by the deadline, contributors can either receive a refund or donate their contributions to FULU.

This bounty program represents a significant step towards enhancing user privacy and control over their video data, offering a local storage alternative for Ring owners. Follow us on Google News, LinkedIn, and X for ongoing updates in cybersecurity. Contact us for story features.

Cyber Security News Tags:Amazon Cloud, Cybersecurity, data privacy, FTC settlement, FULU, hackers bounty, Home Assistant, local storage, privacy concerns, Ring Video Doorbell

Post navigation

Previous Post: WhatsApp Enhances Security with Optional Account Password
Next Post: OpenClaw 2026.2.23 Enhances AI Security and Features

Related Posts

Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware Cyber Security News
Critical Android System Component Vulnerability Let Attackers Execute Remote Code without User Interaction Critical Android System Component Vulnerability Let Attackers Execute Remote Code without User Interaction Cyber Security News
GhostBat RAT Android Malware With Fake RTO Apps Steals Targeting Indian Users to Steal Banking Data GhostBat RAT Android Malware With Fake RTO Apps Steals Targeting Indian Users to Steal Banking Data Cyber Security News
Danabot Malware Resurfaced with Version 669 Following Operation Endgame Danabot Malware Resurfaced with Version 669 Following Operation Endgame Cyber Security News
MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials MacOS Malware NimDoor Weaponizing Zoom SDK Update to Steal Keychain Credentials Cyber Security News
New GitHub Device Code Phishing Attacks Targeting Developers to Steal Tokens New GitHub Device Code Phishing Attacks Targeting Developers to Steal Tokens Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UnsolicitedBooker Shifts Focus to Central Asian Telecoms
  • Spanish Crackdown on Anonymous Fénix Hackers
  • Cyber Group Claims Massive Data Breach at Odido
  • AI-Powered Cyber Attacks Target Global FortiGate Devices
  • Chinese AI Firms Accused of Copying Claude Using 16 Million Queries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UnsolicitedBooker Shifts Focus to Central Asian Telecoms
  • Spanish Crackdown on Anonymous Fénix Hackers
  • Cyber Group Claims Massive Data Breach at Odido
  • AI-Powered Cyber Attacks Target Global FortiGate Devices
  • Chinese AI Firms Accused of Copying Claude Using 16 Million Queries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News