Intel Launches Bug Bounty Expansion For Elite Hackers

Share post:

Intel’s engineers are working with security researchers to look for vulnerabilities in firmware, GPUs, hypervisors, chipsets, and other products as part of its enhanced bug bounty program.

According to Intel, 97 of the 113 vulnerabilities discovered externally in 2021 were reported by researchers participating in the public bug bounty program.

Project Circuit Breaker, the current name of the bounty program expansion, enhances Intel’s existing program and allows invited bug hunters to work with Intel’s product and security teams on various projects.

The program’s activities include live hacking and Capture the Flag events with bounty multipliers of up to 4x, early access to products, and training, all designed to help Intel accelerate security research.

Project Circuit Breaker’s first event, Camping with Tigers, is now running with a group of 20 researchers who were granted systems based on Intel Core i7 processors.

This first event focuses on finding micro-architectural, physical (I/O, storage, flash, memory, sensors, embedded controller, trusted platform module), and firmware (BIOS, IP firmware components, embedded controller, sensor, trusted platform module, storage, flash storage) attacks.

Intel will make public all vulnerabilities found through the bounty program extension through the semiconductor giant’s regular Product Security Incident Response Team (PSIRT) process.

For more information, read the original story in BleepingComputer.

SUBSCRIBE NOW

Related articles

Hamilton Estimates $52 Million to Rebuild IT Systems After Ransomware Attack

The city of Hamilton plans to spend $52 million over the next three years to rebuild and secure...

Avery Data Breach: Credit Card Skimmer Affects Over 61,000 Customers

Label maker Avery has disclosed a data breach affecting 61,193 customers, caused by a credit card skimmer that...

Scammed Company Ordered to Pay $190k for Fraudulent Invoice Payment

A hacker gained access to Mobius Group’s email system and sent instructions from a legitimate email address, directing...

Sneaky 2FA: A Sophisticated Attack Defeats Both 2FA and Phishing Protections

A new phishing kit, ominously named "Sneaky 2FA," has emerged, targeting Microsoft 365 users by bypassing two-factor authentication...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways