Hector Peralta’s Avatar

Researcher Spotlight: Hector Peralta’s Evolution from Popcorn Server to the MSRC Leaderboards | MSRC Blog

Researcher Spotlight: Hector Peralta’s Evolution from Popcorn Server to the MSRC Leaderboards | MSRC Blog “The bug bounty literally changed my life. Before this, I had nothing.” Coolest thing he purchased : His first vehicle! Best gift to give: Buying his nephew gaming accessories. Favorite Hacking Companion : His two Read more…

RANK, RESEARCHER, POINTS; 1, YUKI CHEN, 6495; 2, TERRY ZHANG @PNIG0S, 2305; 3, CALLUM CARNEY, 2152.5; 4, WILLIAM SÖDERBERG, 2092.5; 5, WTM, 2070; 6, MOHAMMAD DEILAMY(MDM), 1880; 7, ZHIYI ZHANG, 1650; 8, SURESH CHELLADURAI, 1162.5; 9, ERIK DONKER, 1100; 10, ZHINIANG PENG (@EDWARDZPENG), 1062.5.

Congratulations to the MSRC 2022 Most Valuable Researchers! | MSRC Blog

Congratulations to the MSRC 2022 Most Valuable Researchers! | MSRC Blog The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers through discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s top 100 Most Read more…

Country map of researchers across the globe.

Microsoft Bug Bounty Programs Year in Review: $13.7M in Rewards | MSRC Blog

Microsoft Bug Bounty Programs Year in Review: $13.7M in Rewards | MSRC Blog The Microsoft Bug Bounty Programs and partnerships with the global security research community are important parts of Microsoft’s holistic approach to defending customers against security threats. Our bounty programs incentivize security research in high-impact areas to stay Read more…

Highlighted URL Rewrite

Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server | MSRC Blog

Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server | MSRC Blog November 8, 2022 update – Microsoft released security updates for CVE-2022-41040 and CVE-2022-41082. We recommend that customers protect their organizations by applying the updates immediately to affected systems. The options described in the Mitigations section are no Read more…