VK placed a program to search for vulnerabilities on the BugBounty.ru platform, which became the third platform with which the company partnered.

VK has placed the bug bounty program on all Russian platforms to find vulnerabilities

In the summer, VK began cooperation with the Positive Technologies Standoff 365 platform, and in November with the BI.ZONE Bug Bounty platform.

The VK program includes 27 projects: VKontakte, Odnoklassniki, Mail.ru mail, RuStore and other services. For each vulnerability identified, bug hunters can receive rewards from 3,000 rubles to 1.8 million rubles, depending on the severity of the threat.

“In 2022, VK ​​​​accepted more than 750 reports, the total amount of payments exceeded 13 million rubles,” said Alexei Volkov, vice president and director of information security at VK.

As RB.RU specified in the company, since the first launch of the program, 163 bug hunters have submitted their reports. The largest payment was 1.2 million rubles.

In November, VK added the RuStore marketplace to its Standoff 365 Bug Bounty platform bug bounty program. For detected errors, the company pays from 3 to 60 thousand rubles.

RB.RU is preparing a big update, and we want to take into account the wishes and interests of you, our readers. If you are ready to share your opinion about RB.RU, please follow the link to fill out a short questionnaire.

Author:

Natalia Gormaleva

Source: RB

Previous articleAnonymous lists more companies that can finance actions in Brasilia
Next articleThis beautiful Apple Watch Series 8 crashes like never before
I am Bret Jackson, a professional journalist and author for Gadget Onus, where I specialize in writing about the gaming industry. With over 6 years of experience in my field, I have built up an extensive portfolio that ranges from reviews to interviews with top figures within the industry. My work has been featured on various news sites, providing readers with insightful analysis regarding the current state of gaming culture.

LEAVE A REPLY

Please enter your comment!
Please enter your name here