{"id":990565,"date":"2024-02-27T08:00:00","date_gmt":"2024-02-27T05:00:00","guid":{"rendered":"https:\/\/gpss.ro\/security-news\/microsoft-boosts-its-microsoft-365-insider-builds-on-windows-bounty-program-with-higher-awards-and-an-expanded-scope\/"},"modified":"2024-02-27T08:00:00","modified_gmt":"2024-02-27T05:00:00","slug":"microsoft-boosts-its-microsoft-365-insider-builds-on-windows-bounty-program-with-higher-awards-and-an-expanded-scope","status":"publish","type":"security_news","link":"https:\/\/delve.ro\/ro\/security-news\/microsoft-boosts-its-microsoft-365-insider-builds-on-windows-bounty-program-with-higher-awards-and-an-expanded-scope\/","title":{"rendered":"Microsoft boosts its Microsoft 365 Insider Builds on Windows Bounty Program with higher awards and an expanded scope"},"content":{"rendered":"<p>Starting today, we are doubling the maximum bounty award for the Microsoft 365 Insider Bug Bounty Program to $30,000 USD for high impact scenarios, such as unauthenticated non-sandboxed code execution with no user interaction. We are also expanding the scope of our bounty program to include more vulnerability types and products.<\/p>","protected":false},"excerpt":{"rendered":"<p>Starting today, we are doubling the maximum bounty award for the Microsoft 365 Insider Bug Bounty Program to $30,000 USD for high impact scenarios, such as unauthenticated non-sandboxed code execution with no user interaction. We are also expanding the scope of our bounty program to include more vulnerability types and products.<\/p>","protected":false},"featured_media":0,"template":"","meta":{"footnotes":""},"news_region":[152],"news_source":[165],"news_severity":[142],"class_list":["post-990565","security_news","type-security_news","status-publish","hentry","news_region-international","news_source-microsoft","news_severity-high"],"_links":{"self":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/security-news-items\/990565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/security-news-items"}],"about":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/types\/security_news"}],"version-history":[{"count":0,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/security-news-items\/990565\/revisions"}],"wp:attachment":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/media?parent=990565"}],"wp:term":[{"taxonomy":"news_region","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/news_region?post=990565"},{"taxonomy":"news_source","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/news_source?post=990565"},{"taxonomy":"news_severity","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/news_severity?post=990565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}