Microsoft asks that its Linux-based operating system be hacked

Microsoft has announced a new bounty that invites hackers to crack its Linux-based operating system, Azure Sphere OS.

The company is paying up to $ 100,000 as part of the Azure Sphere Security Research challenge, an extension of Azure Security Lab.

While registration for this challenge ends on the 15th of this month, the rewards program will be available from June 1 to August 31 for all accepted requests.

Microsoft mentions that it is specifically interested in hackers who can obtain the necessary permissions to execute code on Pluton and Secure World, both actions will be rewarded with $ 100.000.

Microsoft has made big bets on rewards programs of the same kind in order to improve the security of its software, and so far the company has launched similar challenges for its key products, including Windows, Edge and Office.

Researchers will be rewarded $ 30,000 if they find critical vulnerabilities in the Edge browser and $ 15,000 if they manage to breach Office. On the other hand,  Finding a critical RCE bug in Microsoft Hyper-V is rewarding up to $ 250,000.

"Microsoft recognizes that security is not a one-time event. Risks need to be mitigated over the life of the software and are constantly popping up across devices and services. Drawing the attention of the hacker community to investigate long-hitting vulnerabilities before the bad guys do is part of Azure Sphere's program to minimize risks.”Mentions the company.

If you want to be part of this challenge, you can do so by entering the official Microsoft website, at this link.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Frank said

    Contradiction: I don't know whether to ask if the source code for "your system" is available or to comment that this system is going to be violated.