Friday, February 3, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Intel announced the expansion of its bug bounty program with Project Circuit Breaker

Intel announced the expansion of its bug bounty program with Project Circuit Breaker

Chip giant expands its bug bounty program with Project Circuit Breaker that brings ethical hackers and Intel security teams together on a live event.


Rusen Gobel Rusen Gobel
February 4, 2022
2 min read
Intel announced the expansion of its bug bounty program with Project Circuit Breaker

Bug bounty programs are made by several big tech companies regularly and Intel is one of them. The chip giant has announced new additions that will deepen and broaden the bug bounty events. New additions come under the Project Circuit Breaker name.

New techlonogies will be tested

With the addition of the Project Circuit Breaker, the security researchers and the ethical hackers will be able to work directly with Intel’s product and security teams, through the live hacking event that may include bounty multipliers up to 4x, the first time. The event will include targeted time-boxed events on specific platforms/technologies and provide training.

The first event under the Project Circuit Breaker will be Camping with Tigers which will focus on Tiger Lake (11th gen) systems. The event is already underway; 20 researchers have received their Tiger Lake systems for the effort of hacking them. Researchers will try to find vulnerabilities in Intel’s firmware, hypervisors, GPUs, and chipsets.

Tom Garrison, vice president and general manager of Client Security Strategy & Initiatives at Intel
Tom Garrison, vice president and general manager of Client Security Strategy & Initiatives at Intel

Those bug bounty programs are quite useful to attract ethical hackers and security researchers around the world for the sake of identifying existing vulnerabilities. According to Intel, 97 of the 113 externally found vulnerabilities related to the products were reported through the bug bounty programs.

Tom Garrison, vice president and general manager of Client Security Strategy & Initiatives at Intel said;

« Bug bounty programs are a powerful tool to continuously improve the security of our products. Camping with Tigers – our first event under Project Circuit Breaker – brings together world-class security researchers and our own product engineers to deepen testing and improve resiliency on our 11th Gen Intel Core processors. As we aim to develop the most comprehensive security features, we also realize the incredible value of deeper collaborations with the community to identify potential vulnerabilities and mitigate them for the ongoing improvement of our products. »

See more Cybersecurity News


Tags: Intel
Rusen Gobel

Rusen Gobel

Rusen Gobel is a news editor at Cloud7 News. With more than 10 years of experience, Rusen worked as a hardware and software news editor for technology sites such as Shiftdelete, Teknokolis, Hardware Plus, BT Haber. In addition, Rusen publishes consumer product reviews on his YouTube channel. While consumer electronics has been his main focus for years, now Rusen is more interested in WordPress and software development. He had contributed different web application projects in his professional career. Rusen had graduated from Istanbul University, department of Computer Engineering. Rusen has a very high passion for learning and writing for every kind of technology. That's why he has been working as a tech editor for more than ten years on several different technology magazines and online news portals.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Cisco's RV series routers are critically vulnerable

Cisco's RV series routers are critically vulnerable

Related News

Radware announces a new partner program

Radware announces a new partner program

February 3, 2023 1:30 pm
APTs are looking for developers to hire with hefty paychecks

APTs are looking for developers to hire with hefty paychecks

February 1, 2023 2:30 pm
US extradites ShinyHunters hacker

US extradites ShinyHunters hacker

February 1, 2023 1:30 pm
Hacker steals code signing certificates for GitHub Desktop and Atom

Hacker steals code signing certificates for GitHub Desktop and Atom

February 1, 2023 1:00 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc6?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM on VMware Workstation

Recent News

  • Radware announces a new partner program
  • Private equity dominates data center M&A deals
  • The ultimate distro-blend blendOS arrives
  • OpenAI’s AI classifier tool can now detect AI-written text
  • What’s new in Linux Mint 21.2 “Victoria”?

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.