![]() ![]() Kevin Gallerin, APAC managing director at YesWeHack, told The Daily Swig: “With major operators launching new 5G services around the world and an increasing number of devices accessing the network, handset security is of particular interest. The biggest rewards are for critical bugs including remote code execution. ![]() The program invites both individuals and groups of up to five to participate. ZTE web applications and other devices not listed on YesWeHack’s website are out of scope.Ī spokesperson for YesWeHack told The Daily Swig that the program is an expansion of a private offering for invite-only researchers. The program, launched in partnership with French vulnerability disclosure platform YesWeHack, invites researchers to look for security flaws in ZTE products.Ī press release published last night (October 11) detailed several in-scope product categories, including ZTE’s 5G Common Core network, 5G NR broadcast tech, and fixed network, along with multimedia, cloud video, cloud computing, database management systems, and terminal products. UPDATED Mobile phone manufacturer ZTE has announced it has launched a public bug bounty program offering up to €2,000 ($2,300) for security vulnerabilities. Researchers invited to test for flaws under new YesWeHack platform ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |