1
 

Bug Bounty Programs represent a very good marketing tool for companies that run such programs as well for the bug hunters.Participating in such programs as a security professional, you’ll get continuous security training and it will strengthen your personal branding within the Digital and Information Security industry.

PRODUCT AND SERVICES (HALL OF FAME AND NO REWARD)
  1. 37signals - https://37signals.com/security-response
  2. Acquia - https://www.acquia.com/how-report-security-issue
  3. Active Prospect - http://activeprospect.com/activeprospect-security/
  4. Adobe - http://www.adobe.com/support/security/alertus.html
  5. Android Free Apps - http://www.androidfreeapp.net/security-researcher-acknowledgments/
  6. Apple - http://support.apple.com/kb/HT1318
  7. Besnappy - http://besnappy.com/security
  8. Blackberry - http://us.blackberry.com/business/topics/security/incident-response-team/collaborations.html
  9. Braintree - https://www.braintreepayments.com/developers/disclosure
  10. Card - https://www.card.com/responsible-disclosure-policy
  11. cPaperless - http://www.cpaperless.com/securitystatement.aspx
  12. Chargify - https://chargify.com/security/
  13. eBay - http://pages.ebay.com/securitycenter/ResearchersAcknowledgement.html
  14. EVE - http://community.eveonline.com/devblog.asp?a=blog&nbid=2384
  15. Freelancer - http://www.freelancer.com/info/vulnerability-submission.php
  16. Future Of Enforcement - http://futureofenforcement.com/?page_id=695
  17. Gitlab - http://blog.gitlab.com/responsible-disclosure-policy/
  18. Gliph - https://gli.ph/s/security.html
  19. Harmony - http://get.harmonyapp.com/security/
  20. lastpass - https://lastpass.com/support_security.php
  21. Mahara - https://wiki.mahara.org/index.php/Contributors#Security_Researchers
  22. MailChimp - http://mailchimp.com/about/security-response/
  23. Microsoft - http://technet.microsoft.com/en-us/security/cc308589
  24. Netflix - http://support.netflix.com/en/node/6657#gsc.tab=0
  25. Nokia - http://www.nokia.com/global/security/acknowledgements/
  26. Nokia Siemens Networks - http://www.nokiasiemensnetworks.com/about-us/responsible-disclosure
  27. Norada - http://norada.com/crm-software/security_response
  28. Owncloud - http://owncloud.org/about/security/hall-of-fame/
  29. Opera - https://bugs.opera.com/wizarddesktop/
  30. Oracle - http://:oracle.com/technetwork/topics/security/securityfixlifecycle-086982.html
  31. Puppet Labs - https://puppetlabs.com/security/acknowledgments/
  32. RedHat - https://access.redhat.com/knowledge/articles/66234
  33. Risk.io - https://www.risk.io/security
  34. Sellfy - https://sellfy.com/security/
  35. Spotify - https://www.spotify.com/us/about-us/contact/report-security-issues/
  36. Sprout Social - http://sproutsocial.com/responsible-disclosure-policy
  37. Tuenti - http://corporate.tuenti.com/en/dev/hall-of-fame
  38. Twilio - https://www.twilio.com/docs/security/disclosure
  39. Twitter - https://twitter.com/about/security
  40. WizeHive - http://www.wizehive.com/special_thanks.html
  41. Xmarks - https://buy.xmarks.com/security.php
  42. Zendesk - http://www.zendesk.com/company/responsible-disclosure-policy
  43. Zynga - http://company.zynga.com/security/whitehats


PRODUCT AND SERVICES (HALL OF FAME + SWAG) Reward: T-shirt 
  1. Atlassian - https://confluence.atlassian.com/display/SUPPORT/How+to+Report+a+Security+Issue
  2. Dropbox - https://www.dropbox.com/special_thanks
  3. Engineyard - https://www.engineyard.com/legal/responsible-disclosure-policy
  4. Github - https://help.github.com/articles/responsible-disclosure-of-security-vulnerabilities
  5. ifixit - http://www.ifixit.com/Info/Responsible_Disclosure
  6. Paymill - https://www.paymill.com/en-gb/support-3/worth-knowing/security/
  7. Schuberg Philis - http://www.schubergphilis.com/newsroom/library/downloads-policies/responsible-disclosure-policy/
  8. Soundcloud - http://help.soundcloud.com/customer/portal/articles/439715-responsible-disclosure
  9. Yahoo - http://security.yahoo.com
PRODUCTS AND SERVICES (REWARD OFFERED)
  1. Access - https://www.accessnow.org/prize
  2. AT&T - http://developer.att.com/developer/apiDetailPage.jsp?passedItemId=10700235
  3. Avast! - http://www.avast.com/bug-bounty
  4. Barracuda - http://barracudalabs.com/?page_id=3456
  5. Chromium Project - http://www.chromium.org/Home/chromium-security/vulnerability-rewards-program
  6. Coinbase - https://coinbase.com/whitehat
  7. Cryptocat - https://crypto.cat/bughunt/
  8. Etsy - http://www.etsy.com/help/article/2463
  9. Facebook - http://www.facebook.com/whitehat/bounty/
  10. Gallery - http://codex.gallery2.org/Bounties
  11. Google - http://www.google.com/about/company/rewardprogram.html
  12. Hex-Rays - http://www.hex-rays.com/bugbounty.shtml
  13. IntegraXor (SCADA) - http://www.integraxor.com/blog/integraxor-hmi-scada-bug-bounty-program
  14. Kaneva - http://docs.kaneva.com/mediawiki/index.php/Bug_Bounty
  15. LaunchKey - https://launchkey.com/docs/whitehat
  16. ManageWP - https://managewp.com/white-hat-reward
  17. Marktplatts - http://statisch.marktplaats.nl/help/responsible_disclosure_policy_en.html
  18. Mega.co.nz - http://thenextweb.com/insider/2013/02/01/kim-dotcom-puts-up-13500-bounty-for-first-person-to-break-megas-security-system/
  19. Meraki - http://www.meraki.com/trust/#srp
  20. Microsoft - http://www.microsoft.com/security/msrc/report/bountyprograms.aspx
  21. Mozilla - http://www.mozilla.org/security/bug-bounty.html
  22. Paypal - https://www.paypal.com/us/webapps/mpp/security/reporting-security-issues
  23. PikaPay - https://www.pikapay.com/pikapay-security-policy/
  24. Piwik - http://piwik.org/security/
  25. Qmail - http://cr.yp.to/djbdns/guarantee.html
  26. Ripple - https://ripple.com/bug-bounty/
  27. Samsung - https://samsungtvbounty.com/
  28. Simple - https://www.simple.com/policies/website-security/
  29. Tarsnap - https://www.tarsnap.com/bugbounty.html
  30. Yandex - http://company.yandex.com/security/index.xml



Like it ? Share it.

Post a Comment

Comment Rules :
1. Do not post Adult/illegal Links.
2. Try to comment in only English Language.
3. Do not post other website's links which are useless.
4. Your Comment should be based on the Topic for other queries Kindly Visit our Contact Us Page.
5. Do not use Abusive Language.
6. Respect each other.
Thank You for following the rules. Please Comment....

 
Top