Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Boosts .NET Bounty Program Rewards to $40,000

Posted on August 1, 2025August 1, 2025 By CWS

Microsoft on Thursday introduced that safety researchers can now earn as much as $40,000 in rewards for qualifying reviews detailing vulnerabilities within the .NET framework and adjoining applied sciences.

researchers, the tech large says, could earn the utmost rewards for full reviews detailing critical-severity distant code execution (RCE) or elevation of privilege (EoP) flaws in .NET and ASP.NET Core (together with Blazor and Aspire). 

Researchers reporting safety bypasses could obtain rewards of as much as $30,000 for his or her findings, whereas distant denial-of-service (DoS) bugs might earn them as much as $20,000. Microsoft can pay as much as $20,000 for spoofing or tampering points, data disclosure bugs, and circumstances of insecure documentation.

The tech large additionally introduced that the scope of the bug bounty program has been expanded, now masking all supported .NET and ASP.NET variations, F# and different adjoining applied sciences, supported ASP.NET Core for .NET Framework variations, templates for .NET and ASP.NET Core, and GitHub Actions within the .NET and ASP.NET Core repositories.

Moreover, Microsoft has made adjustments to submission analysis and rewarding, with clearer severity ranges, safety impacts, and revised standards for report high quality.

As a part of the restructured .NET Bounty Program, Microsoft will calculate rewards based mostly on a vulnerability’s potential influence, in order that high-severity safety defects obtain larger payouts.

The brand new safety influence varieties are aligned to these Microsoft makes use of in different bug bounty packages, in order that researchers can higher perceive submission assessments.

Each report, Microsoft notes, can be rated ‘full’ or ‘not full’, based mostly on the presence of totally practical exploits. Researchers will obtain decrease rewards for theoretical eventualities.Commercial. Scroll to proceed studying.

Thus, ‘not full’ submissions detailing critical-severity RCE, EoP, and safety bypass bugs can be awarded as much as $20,000. Distant DoS reviews that aren’t full can be awarded as much as $15,000, whereas these for spoofing, data disclosure, and insecure documentation is not going to earn greater than $7,000.

“These updates promote transparency and encourage detailed, actionable submissions that assist enhance the safety of the .NET ecosystem,” Microsoft notes.

Associated: $1 Million Supplied for WhatsApp Exploit at Pwn2Own Eire 2025

Associated: Google Paid Out $12 Million by way of Bug Bounty Packages in 2024

Associated: Don’t Let Your Profession Go the Means of Leisure 720

Associated: Researcher Earns $30,000 for Instagram Flaw Exposing Non-public Posts

Security Week News Tags:.NET, Boosts, Bounty, Microsoft, Program, Rewards

Post navigation

Previous Post: Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft
Next Post: Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Related Posts

Soverli Raises $2.6 Million for Secure Smartphone OS Security Week News
Google DeepMind Unveils Defense Against Indirect Prompt Injection Attacks Security Week News
Personal Information Compromised in Freedom Mobile Data Breach Security Week News
Highly Popular NPM Packages Poisoned in New Supply Chain Attack Security Week News
Anubis Ransomware Packs a Wiper to Permanently Delete Files Security Week News
AI Takes Center Stage at DataTribe’s Cyber Innovation Day Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls
  • New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards
  • China-Aligned APT Hackers Exploit Windows Group Policy to Deploy Malware
  • Amazon Catches North Korean IT Worker by Tracking Tiny 110ms Keystroke Delays
  • INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls
  • New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards
  • China-Aligned APT Hackers Exploit Windows Group Policy to Deploy Malware
  • Amazon Catches North Korean IT Worker by Tracking Tiny 110ms Keystroke Delays
  • INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark