Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Boosts .NET Bounty Program Rewards to $40,000

Posted on August 1, 2025August 1, 2025 By CWS

Microsoft on Thursday introduced that safety researchers can now earn as much as $40,000 in rewards for qualifying reviews detailing vulnerabilities within the .NET framework and adjoining applied sciences.

researchers, the tech large says, could earn the utmost rewards for full reviews detailing critical-severity distant code execution (RCE) or elevation of privilege (EoP) flaws in .NET and ASP.NET Core (together with Blazor and Aspire). 

Researchers reporting safety bypasses could obtain rewards of as much as $30,000 for his or her findings, whereas distant denial-of-service (DoS) bugs might earn them as much as $20,000. Microsoft can pay as much as $20,000 for spoofing or tampering points, data disclosure bugs, and circumstances of insecure documentation.

The tech large additionally introduced that the scope of the bug bounty program has been expanded, now masking all supported .NET and ASP.NET variations, F# and different adjoining applied sciences, supported ASP.NET Core for .NET Framework variations, templates for .NET and ASP.NET Core, and GitHub Actions within the .NET and ASP.NET Core repositories.

Moreover, Microsoft has made adjustments to submission analysis and rewarding, with clearer severity ranges, safety impacts, and revised standards for report high quality.

As a part of the restructured .NET Bounty Program, Microsoft will calculate rewards based mostly on a vulnerability’s potential influence, in order that high-severity safety defects obtain larger payouts.

The brand new safety influence varieties are aligned to these Microsoft makes use of in different bug bounty packages, in order that researchers can higher perceive submission assessments.

Each report, Microsoft notes, can be rated ‘full’ or ‘not full’, based mostly on the presence of totally practical exploits. Researchers will obtain decrease rewards for theoretical eventualities.Commercial. Scroll to proceed studying.

Thus, ‘not full’ submissions detailing critical-severity RCE, EoP, and safety bypass bugs can be awarded as much as $20,000. Distant DoS reviews that aren’t full can be awarded as much as $15,000, whereas these for spoofing, data disclosure, and insecure documentation is not going to earn greater than $7,000.

“These updates promote transparency and encourage detailed, actionable submissions that assist enhance the safety of the .NET ecosystem,” Microsoft notes.

Associated: $1 Million Supplied for WhatsApp Exploit at Pwn2Own Eire 2025

Associated: Google Paid Out $12 Million by way of Bug Bounty Packages in 2024

Associated: Don’t Let Your Profession Go the Means of Leisure 720

Associated: Researcher Earns $30,000 for Instagram Flaw Exposing Non-public Posts

Security Week News Tags:.NET, Boosts, Bounty, Microsoft, Program, Rewards

Post navigation

Previous Post: Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft
Next Post: Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Related Posts

Google Gemini Tricked Into Showing Phishing Message Hidden in Email  Security Week News
Marketing, Law Firms Say Data Breaches Impact Over 200,000 People Security Week News
Maze Banks $25M to Tackle Cloud Security with AI Agents Security Week News
Over 30 Vulnerabilities Patched in Android Security Week News
Vulnerabilities in CISA KEV Are Not Equally Critical: Report Security Week News
New UK Framework Pressures Vendors on SBOMs, Patching and Default MFA Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News