Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Boosts .NET Bounty Program Rewards to $40,000

Posted on August 1, 2025August 1, 2025 By CWS

Microsoft on Thursday introduced that safety researchers can now earn as much as $40,000 in rewards for qualifying reviews detailing vulnerabilities within the .NET framework and adjoining applied sciences.

researchers, the tech large says, could earn the utmost rewards for full reviews detailing critical-severity distant code execution (RCE) or elevation of privilege (EoP) flaws in .NET and ASP.NET Core (together with Blazor and Aspire). 

Researchers reporting safety bypasses could obtain rewards of as much as $30,000 for his or her findings, whereas distant denial-of-service (DoS) bugs might earn them as much as $20,000. Microsoft can pay as much as $20,000 for spoofing or tampering points, data disclosure bugs, and circumstances of insecure documentation.

The tech large additionally introduced that the scope of the bug bounty program has been expanded, now masking all supported .NET and ASP.NET variations, F# and different adjoining applied sciences, supported ASP.NET Core for .NET Framework variations, templates for .NET and ASP.NET Core, and GitHub Actions within the .NET and ASP.NET Core repositories.

Moreover, Microsoft has made adjustments to submission analysis and rewarding, with clearer severity ranges, safety impacts, and revised standards for report high quality.

As a part of the restructured .NET Bounty Program, Microsoft will calculate rewards based mostly on a vulnerability’s potential influence, in order that high-severity safety defects obtain larger payouts.

The brand new safety influence varieties are aligned to these Microsoft makes use of in different bug bounty packages, in order that researchers can higher perceive submission assessments.

Each report, Microsoft notes, can be rated ‘full’ or ‘not full’, based mostly on the presence of totally practical exploits. Researchers will obtain decrease rewards for theoretical eventualities.Commercial. Scroll to proceed studying.

Thus, ‘not full’ submissions detailing critical-severity RCE, EoP, and safety bypass bugs can be awarded as much as $20,000. Distant DoS reviews that aren’t full can be awarded as much as $15,000, whereas these for spoofing, data disclosure, and insecure documentation is not going to earn greater than $7,000.

“These updates promote transparency and encourage detailed, actionable submissions that assist enhance the safety of the .NET ecosystem,” Microsoft notes.

Associated: $1 Million Supplied for WhatsApp Exploit at Pwn2Own Eire 2025

Associated: Google Paid Out $12 Million by way of Bug Bounty Packages in 2024

Associated: Don’t Let Your Profession Go the Means of Leisure 720

Associated: Researcher Earns $30,000 for Instagram Flaw Exposing Non-public Posts

Security Week News Tags:.NET, Boosts, Bounty, Microsoft, Program, Rewards

Post navigation

Previous Post: Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft
Next Post: Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Related Posts

Nova Scotia Power Confirms Ransomware Attack, 280k Notified of Data Breach Security Week News
Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones Security Week News
Qantas Hit with Extortion Demand After Data Breach Security Week News
Cato Networks Raises $359 Million to Expand SASE Business Security Week News
EU Cybersecurity Agency ENISA Launches European Vulnerability Database Security Week News
Cyber Intelligence Firm iCOUNTER Emerges From Stealth With $30 Million in Funding Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News