Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Boosts .NET Bounty Program Rewards to ,000

Microsoft Boosts .NET Bounty Program Rewards to $40,000

Posted on August 1, 2025August 1, 2025 By CWS

Microsoft on Thursday introduced that safety researchers can now earn as much as $40,000 in rewards for qualifying reviews detailing vulnerabilities within the .NET framework and adjoining applied sciences.

researchers, the tech large says, could earn the utmost rewards for full reviews detailing critical-severity distant code execution (RCE) or elevation of privilege (EoP) flaws in .NET and ASP.NET Core (together with Blazor and Aspire). 

Researchers reporting safety bypasses could obtain rewards of as much as $30,000 for his or her findings, whereas distant denial-of-service (DoS) bugs might earn them as much as $20,000. Microsoft can pay as much as $20,000 for spoofing or tampering points, data disclosure bugs, and circumstances of insecure documentation.

The tech large additionally introduced that the scope of the bug bounty program has been expanded, now masking all supported .NET and ASP.NET variations, F# and different adjoining applied sciences, supported ASP.NET Core for .NET Framework variations, templates for .NET and ASP.NET Core, and GitHub Actions within the .NET and ASP.NET Core repositories.

Moreover, Microsoft has made adjustments to submission analysis and rewarding, with clearer severity ranges, safety impacts, and revised standards for report high quality.

As a part of the restructured .NET Bounty Program, Microsoft will calculate rewards based mostly on a vulnerability’s potential influence, in order that high-severity safety defects obtain larger payouts.

The brand new safety influence varieties are aligned to these Microsoft makes use of in different bug bounty packages, in order that researchers can higher perceive submission assessments.

Each report, Microsoft notes, can be rated ‘full’ or ‘not full’, based mostly on the presence of totally practical exploits. Researchers will obtain decrease rewards for theoretical eventualities.Commercial. Scroll to proceed studying.

Thus, ‘not full’ submissions detailing critical-severity RCE, EoP, and safety bypass bugs can be awarded as much as $20,000. Distant DoS reviews that aren’t full can be awarded as much as $15,000, whereas these for spoofing, data disclosure, and insecure documentation is not going to earn greater than $7,000.

“These updates promote transparency and encourage detailed, actionable submissions that assist enhance the safety of the .NET ecosystem,” Microsoft notes.

Associated: $1 Million Supplied for WhatsApp Exploit at Pwn2Own Eire 2025

Associated: Google Paid Out $12 Million by way of Bug Bounty Packages in 2024

Associated: Don’t Let Your Profession Go the Means of Leisure 720

Associated: Researcher Earns $30,000 for Instagram Flaw Exposing Non-public Posts

Security Week News Tags:.NET, Boosts, Bounty, Microsoft, Program, Rewards

Post navigation

Previous Post: Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft
Next Post: Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Related Posts

Imper.ai Emerges From Stealth Mode With  Million in Funding Imper.ai Emerges From Stealth Mode With $28 Million in Funding Security Week News
Cisco’s Quantum Bet: Linking Small Machines Into One Giant Quantum Computer Cisco’s Quantum Bet: Linking Small Machines Into One Giant Quantum Computer Security Week News
Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks Security Week News
Approov Raises .7 Million for Mobile App Security Approov Raises $6.7 Million for Mobile App Security Security Week News
Cyber Insights 2026: Social Engineering Cyber Insights 2026: Social Engineering Security Week News
Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark