Crowdfense announces $15m bounty fund for 2019

Vulnerability research company increases bug bounty fund, adds new categories

Tags: Bug bountyCrowdfense Ltd ( Arab Emirates
  • E-Mail
Crowdfense announces $15m bounty fund for 2019 Crowdfense's 2018 vulnerability program was well received by the research community, says Manzoni.
By  Mark Sutton Published  March 10, 2019

UAE-based vulnerability research company Crowdfense has launched a new $15m bug bounty fund for 2019.

The company's Acquisition Program for this year has increased from $10m last year, and the company has also expanded its program to include WiFi routers and SMS and instant messaging platforms.

Crowdfense paid out the full $10m fund in 2018, for zero-day vulnerabilities in Windows, MacOS, iOS and Android.

"We work only with the best vulnerability researchers, focusing on very select capabilities, with a highly structured and process-driven approach," said Crowdfense director Andrea Zapparoli Manzoni.

"Last year's $10M bug bounty program was very well received by researchers, together with our unique Vulnerability Research Hub (VRH) online platform. We also offered free high-level technical training sessions to hundreds of vulnerability researchers around the world, as a part of our commitment to support the research community. Now it is time to scale up our operations."

The company, which launched in 2017, to acquire zero day vulnerabilities for trading to legitimate law enforcement and government users. Crowdfense has set out with the aim of professionalizing the bug bounty market, and making it more sustainable and trustworthy.

This year, the company says it plans to capitalize on this success by increasing their investments, improving the VRH platform with a new Training Area and extending the scope of the Acquisition Program to include other important areas of research like Networking Devices and Instant Messengers.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code