April 26, 2016 By Douglas Bonderud 2 min read

Bugs are everywhere — and they’re ever-evolving. When internal IT teams track down and eliminate one bug, two more spring up in its place.

Rather than waiting for hackers to punch through and exploit these vulnerabilities, however, many organizations have turned to “bug bounty” initiatives, which encourage users to find and report critical bugs, often with the promise of a cash reward. Now MIT has jumped on the bandwagon and slapped down its own bug bounty program — but it’s a little off the beaten path.

‘Cash’ Rewards

According to SecurityWeek, the program is still in alpha testing and is only open to MIT affiliates who hold valid certificates. This group includes grads and undergrads but eliminates outside security firms, who are encouraged to report any found bugs to MIT’s security team.

So far, the bug bounty focuses on the student.mit.edu, atlas.mit.edu, learning-modules.mit.edu and bounty.mit.edu domains. If users find and report bugs, they’re asked to not disclose any information publicly until the vulnerability is patched, and they’re warned against using “noisy” scanners or conducting “disruptive” tests.

So what can bug trackers earn for their work? Cash — sort of. As Threatpost reports, the school is paying out in TechCASH, which can be used for food, books and various services near the university’s campus in Cambridge, Massachusetts.

The bug bounty website also makes it clear that TechCASH is not a “payment” for services and is awarded at the discretion of the school. In addition, bug hunters are not compensated for any time spent researching.

It’s also worth noting that the program has report restrictions: MIT is only willing to pay for details on remote code execution, SQL injection, authorization bypass, information leaks, cross-site scripting and cross-site request forgery vulnerabilities. DDoS, social engineering attacks and those vulnerabilities that require on-site access are off the table.

Bug Bounty Program: An Effective Repellent?

MIT isn’t the only big-name institution rolling out a bug bounty program. As noted by Tech Times, the U.S. Department of Defense is running their first-ever “Hack the Pentagon” campaign from April 18 to May 12. This program encourages white-hat hackers to break into specific systems in an effort to report on vulnerabilities. While hackers have to pass a background check and agree to follow the rules of the game — and can’t come from countries embargoed by the United States — there’s $150,000 up for grabs.

Then there’s the bug bounty design firm Bugcrowd, which creates bug-catching frameworks for other companies. As noted by eWEEK, Casey Ellis, the CEO of Bugcrowd, used to spend most of his time “explaining what a bug bounty was to people.” Today, the company has secured $15 million in Series B funding, which has allowed them to reach $24 million in total financing to date.

So what’s the bottom line? Hackers are looking for corporate bugs. If left alone, these bugs pose a serious risk. But if companies are willing to pay out — or offer meal tickets to hungry undergrads — there’s a huge market for finding and squashing these little critters before they see the light of day.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today