{"id":332585,"date":"2025-03-14T13:57:40","date_gmt":"2025-03-14T17:57:40","guid":{"rendered":"https:\/\/msftnewsnow.com\/?p=332585"},"modified":"2025-05-06T17:36:28","modified_gmt":"2025-05-07T00:36:28","slug":"msrc-record-60-million-in-bug-bounties","status":"publish","type":"post","link":"https:\/\/msftnewsnow.com\/msrc-record-60-million-in-bug-bounties\/","title":{"rendered":"Microsoft&#8217;s Security Response Center (MSRC) Reveals Comprehensive Vulnerability Management Strategy with Record $60+ Million in Bug Bounties"},"content":{"rendered":"<div class=\"relative\">\n<div class=\"prose text-pretty dark:prose-invert inline leading-normal break-words min-w-0 [word-break:break-word]\">\n<p>Microsoft has intensified its commitment to vulnerability management through the Microsoft Security Response Center (MSRC). <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/03\/13\/how-msrc-coordinates-vulnerability-research-and-disclosure-while-building-community\/\" target=\"_blank\" rel=\"noopener\">According to a detailed blog post published yesterday<\/a>, the MSRC serves as the central hub for investigating vulnerabilities, coordinating their disclosure, and releasing critical security updates to protect both customers and Microsoft&#8217;s infrastructure from emerging cyberthreats.<\/p>\n<p>The timing of this announcement coincides with <a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/03\/14\/microsoft-pays-hackers-166-million-but-windows-zero-days-continue\/\" target=\"_blank\" rel=\"noopener\">Microsoft&#8217;s record-breaking $16.6 million payout<\/a> to ethical hackers and security researchers through its bug bounty programs over the past year. This substantial investment represents a significant increase from the approximately $13 million paid annually between 2020 and 2023, bringing the total payouts since the program&#8217;s inception in 2013 to an impressive $60+ million.<\/p>\n<h2><strong>Expanding the Microsoft Bug Bounty Ecosystem<\/strong><\/h2>\n<p><img decoding=\"async\" data-attachment-id=\"332607\" data-permalink=\"https:\/\/msftnewsnow.com\/msrc-record-60-million-in-bug-bounties\/security_1028749_blog_250307-1536x864\/#main\" data-orig-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Security_1028749_Blog_250307-1536x864-1.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-orig-size=\"1080,608\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Security_1028749_Blog_250307-1536&#215;864\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Security_1028749_Blog_250307-1536x864-1.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-large-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Security_1028749_Blog_250307-1536x864-1.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" class=\"alignnone wp-image-332607 size-full\" src=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Security_1028749_Blog_250307-1536x864-1.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" alt=\"MSRC\" width=\"1080\" height=\"608\" srcset=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Security_1028749_Blog_250307-1536x864-1.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 1080w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Security_1028749_Blog_250307-1536x864-1-150x84.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 150w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Security_1028749_Blog_250307-1536x864-1.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=216&amp;ssl=1 216w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Security_1028749_Blog_250307-1536x864-1.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=432&amp;ssl=1 432w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Security_1028749_Blog_250307-1536x864-1.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=648&amp;ssl=1 648w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Security_1028749_Blog_250307-1536x864-1.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=864&amp;ssl=1 864w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/p>\n<p>Microsoft currently operates <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/bounty\" target=\"_blank\" rel=\"noopener\">18 distinct bug bounty programs<\/a> covering a wide range of products and services, including <a href=\"https:\/\/msftnewsnow.com\/tag\/azure\" target=\"_blank\" rel=\"noopener\">Azure<\/a>, <a href=\"https:\/\/msftnewsnow.com\/tag\/microsoft-365\" target=\"_blank\" rel=\"noopener\">Microsoft 365<\/a>, Windows, Power Platform, <a href=\"https:\/\/msftnewsnow.com\/tag\/dynamics-365\" target=\"_blank\" rel=\"noopener\">Dynamics 365<\/a>, Edge, and Xbox. Between July 2023 and June 2024, the company rewarded 343 researchers from 55 countries for discovering and reporting more than 1,300 eligible vulnerabilities across this extensive product portfolio.<\/p>\n<p>The past year has seen substantial expansion of Microsoft&#8217;s bounty programs, with the introduction of new initiatives including the Defender Bounty Program and AI Bounty Program. Most notably, the company launched Microsoft Zero Day Quest, which adds $4 million in potential rewards specifically targeting high-impact vulnerabilities in cloud and AI technologies.<\/p>\n<p>&#8220;These programs are an important part of our proactive strategy of incentivizing the external security research community to partner with us and help protect our customers from security threats,&#8221; <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/03\/13\/how-msrc-coordinates-vulnerability-research-and-disclosure-while-building-community\/\" target=\"_blank\" rel=\"noopener\">the blog post states<\/a>.<\/p>\n<h2><strong>Coordinated Vulnerability Disclosure Principle<\/strong><\/h2>\n<p><img decoding=\"async\" data-attachment-id=\"332619\" data-permalink=\"https:\/\/msftnewsnow.com\/msrc-record-60-million-in-bug-bounties\/unnamed-3\/#main\" data-orig-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/unnamed.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-orig-size=\"720,720\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"unnamed\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/unnamed.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-large-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/unnamed.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" class=\"alignnone size-full wp-image-332619\" src=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/unnamed.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" alt=\"msrc\" width=\"720\" height=\"720\" srcset=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/unnamed.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 720w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/unnamed-150x150.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 150w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/unnamed.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=288&amp;ssl=1 288w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/unnamed.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=432&amp;ssl=1 432w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/unnamed.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=576&amp;ssl=1 576w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>At the heart of Microsoft&#8217;s security strategy is the <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/cvd\" target=\"_blank\" rel=\"noopener\">Coordinated Vulnerability Disclosure (CVD) principle<\/a>, which balances researcher recognition with responsible mitigation of vulnerabilities. This approach gives Microsoft the opportunity to address newly reported security flaws before they can be exploited, while ensuring researchers receive appropriate credit for their discoveries.<\/p>\n<p>The MSRC works closely with Microsoft engineering teams to develop proactive mitigations based on researcher findings, often eliminating entire classes of vulnerabilities. For cloud service vulnerabilities that can be fixed on Microsoft&#8217;s servers without customer action, the company now discloses all critical cloud common vulnerabilities and exposures (CVEs) to maintain transparency.<\/p>\n<p>To enhance customer security response capabilities, Microsoft recently expanded its CVD strategy to include machine-readable Common Security Advisory Framework (CSAF) files. These complement existing channels like the Security Updates API and the MSRC Security Update Guide, giving customers more tools to rapidly identify and address potential security issues.<\/p>\n<h2><strong>Industry Collaboration Through MAPP<\/strong><\/h2>\n<p>Through the <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/mapp\" target=\"_blank\" rel=\"noopener\">Microsoft Active Protections Program (MAPP)<\/a>, over 100 security technology providers receive early access to vulnerability information ahead of Microsoft&#8217;s monthly security updates. This advance notice allows these partners to develop and deploy updated protections through their security software or devices before vulnerabilities become widely known.<\/p>\n<p>The program represents a significant industry collaboration, enabling security vendors to provide timely protections through antivirus software, network-based intrusion detection systems, and host-based intrusion prevention systems.<\/p>\n<h2><strong>Security Updates and Community Education<\/strong><\/h2>\n<p>Microsoft maintains a structured approach to security updates, releasing them for most products on the second Tuesday of each month at 10:00 AM PT. This predictable cadence helps IT administrators plan deployment schedules effectively.<\/p>\n<p>Beyond vulnerability management, the MSRC places strong emphasis on cybersecurity education through various channels. The MSRC blog provides important public updates on vulnerabilities, while the BlueHat security conference brings together leading researchers and practitioners to share knowledge and best practices.<\/p>\n<h2><strong>Zero Day Quest<\/strong><\/h2>\n<p><img decoding=\"async\" data-attachment-id=\"332610\" data-permalink=\"https:\/\/msftnewsnow.com\/msrc-record-60-million-in-bug-bounties\/f4950e1b-f614-4e3c-b3ac-545533cfe709\/#main\" data-orig-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/f4950e1b-f614-4e3c-b3ac-545533cfe709-e1741976143266.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-orig-size=\"720,692\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"f4950e1b-f614-4e3c-b3ac-545533cfe709\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/f4950e1b-f614-4e3c-b3ac-545533cfe709-e1741976143266.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-large-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/f4950e1b-f614-4e3c-b3ac-545533cfe709-e1741976143266.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" class=\"alignnone size-full wp-image-332610\" src=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/f4950e1b-f614-4e3c-b3ac-545533cfe709-e1741976143266.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" alt=\"msrc\" width=\"720\" height=\"692\" srcset=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/f4950e1b-f614-4e3c-b3ac-545533cfe709-e1741976143266.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 720w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/f4950e1b-f614-4e3c-b3ac-545533cfe709-e1741976143266-150x144.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 150w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/f4950e1b-f614-4e3c-b3ac-545533cfe709-e1741976143266.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=288&amp;ssl=1 288w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/f4950e1b-f614-4e3c-b3ac-545533cfe709-e1741976143266.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=432&amp;ssl=1 432w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/f4950e1b-f614-4e3c-b3ac-545533cfe709-e1741976143266.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=576&amp;ssl=1 576w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><\/p>\n<p>Microsoft has announced an ambitious <a href=\"https:\/\/msrc.microsoft.com\/blog\/2024\/11\/securing-ai-and-cloud-with-the-zero-day-quest\/\" target=\"_blank\" rel=\"noopener\">initiative called Zero Day Quest<\/a>, which will offer up to $4 million in bounties. This invitation-only hacking event will bring together top-ranked researchers at Microsoft&#8217;s Redmond campus, while a separate research challenge open to anyone will run from November 2024 through January 19, 2025.<\/p>\n<p>The focus areas for the upcoming Zero Day Quest event include critical and important severity Remote Code Execution, Elevation of Privilege vulnerabilities, and high-impact scenarios across <a href=\"https:\/\/msftnewsnow.com\/tag\/azure\" target=\"_blank\" rel=\"noopener\">Azure<\/a>, Microsoft Dynamics 365, Power Platform, and Microsoft 365. This targeted approach demonstrates Microsoft&#8217;s strategic prioritization of the most dangerous vulnerability classes.<\/p>\n<p>As cyber threats continue to evolve in complexity and scale, Microsoft&#8217;s expanded bug bounty initiatives represent a crucial component of the company&#8217;s multi-layered approach to security. By incentivizing the global security research community to identify and report vulnerabilities, <a href=\"https:\/\/msftnewsnow.com\/microsofts-march-2025-patch-tuesday-7-zero-days\/\" target=\"_blank\" rel=\"noopener\">Microsoft aims to stay ahead of potential exploits<\/a> while continuously improving the security of its products and services that billions of users rely on daily.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has intensified its commitment to vulnerability management through the Microsoft Security Response Center (MSRC). According to a detailed blog post published yesterday, the MSRC serves as the central hub for investigating vulnerabilities, coordinating their disclosure, and releasing critical security updates to protect both customers and Microsoft&#8217;s infrastructure from emerging cyberthreats. The timing of this &#8230; <a title=\"Microsoft&#8217;s Security Response Center (MSRC) Reveals Comprehensive Vulnerability Management Strategy with Record $60+ Million in Bug Bounties\" class=\"read-more\" href=\"https:\/\/msftnewsnow.com\/msrc-record-60-million-in-bug-bounties\/\" aria-label=\"Read more about Microsoft&#8217;s Security Response Center (MSRC) Reveals Comprehensive Vulnerability Management Strategy with Record $60+ Million in Bug Bounties\">Read more<\/a><\/p>\n","protected":false},"author":208461344,"featured_media":332619,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":true,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[24],"tags":[40,829,1271,761,1108,87,919,778,668,2181,1109,1083,275,1216],"class_list":["post-332585","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-azure","tag-copilot","tag-cybersecurity","tag-developer","tag-dynamics-365","tag-google","tag-hacking","tag-microsoft","tag-microsoft-365","tag-microsoft-security","tag-power-platform","tag-security","tag-windows","tag-xbox"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/msftnewsnow.com\/wp-content\/uploads\/2025\/03\/unnamed.jpg","jetpack_shortlink":"https:\/\/wp.me\/pfgCZY-1owh","jetpack-related-posts":[{"id":350194,"url":"https:\/\/msftnewsnow.com\/microsoft-365-pdf-export-feature-critical-flaw-fix\/","url_meta":{"origin":332585,"position":0},"title":"Microsoft 365 PDF Export Feature Vulnerability: Critical Flaw Patched","author":"Dave W. Shanahan","date":"July 9, 2025","format":false,"excerpt":"A critical security vulnerability was recently discovered and patched in the widely used Microsoft 365 PDF export feature. The flaw, classified as a Local File Inclusion (LFI) vulnerability, allowed attackers to access sensitive files stored on Microsoft 365 servers during the document-to-PDF conversion process. As noted by GBHackers, Microsoft has\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft 365 PDF Export Feature Vulnerability: Critical Flaw Patched","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/5588bff3-0bed-45ea-9034-e24f50732b17-scaled.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/5588bff3-0bed-45ea-9034-e24f50732b17-scaled.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/5588bff3-0bed-45ea-9034-e24f50732b17-scaled.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/07\/5588bff3-0bed-45ea-9034-e24f50732b17-scaled.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":351492,"url":"https:\/\/msftnewsnow.com\/chinese-hackers-exploit-sharepoint-vulnerabilities\/","url_meta":{"origin":332585,"position":1},"title":"Microsoft Says Chinese State Actors Exploit New SharePoint Vulnerabilities: CVE-2025-53770, CVE-2025-49704, CVE-2025-49706, and CVE-2025-53771, Immediate Security Updates Required","author":"Dave W. Shanahan","date":"July 22, 2025","format":false,"excerpt":"Microsoft has sounded the alarm after discovering ongoing, active exploitation of multiple critical SharePoint vulnerabilities in on-premises SharePoint Server deployments. The Microsoft Security Response Center (MSRC) blog published on July 19, 2025, reveals that Chinese nation-state actors, including Linen Typhoon, Violet Typhoon, and Storm-2603, are targeting CVE-2025-53770, CVE-2025-49704, CVE-2025-49706, and\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Chinese State Actors Exploit New SharePoint Vulnerabilities: CVE-2025-53770, CVE-2025-49704, CVE-2025-49706, and CVE-2025-53771, Microsoft Urges Immediate Security Updates","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/07\/png-transparent-microsoft-sharepoint-server-microsoft-project-web-part-document-share-blue-text-trademark.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/07\/png-transparent-microsoft-sharepoint-server-microsoft-project-web-part-document-share-blue-text-trademark.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/07\/png-transparent-microsoft-sharepoint-server-microsoft-project-web-part-document-share-blue-text-trademark.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/07\/png-transparent-microsoft-sharepoint-server-microsoft-project-web-part-document-share-blue-text-trademark.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":354048,"url":"https:\/\/msftnewsnow.com\/microsoft-supercharges-dotnet-bounty-program-40000\/","url_meta":{"origin":332585,"position":2},"title":"Microsoft Supercharges .NET Bounty Program: Up to $40,000 Now Offered for Top Vulnerabilities","author":"Dave W. Shanahan","date":"August 1, 2025","format":false,"excerpt":"Microsoft has officially expanded and enhanced the .NET Bounty Program, now offering up to $40,000 in awards for eligible vulnerability reports impacting .NET and ASP.NET Core (including Blazor and Aspire). This move, effective July 31, 2025, marks the largest reward increase since the program's inception and underscores Microsoft's commitment to\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft Supercharges .NET Bounty Program: Up to $40,000 Now Offered for Top Vulnerabilities","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/08\/chart-scaled.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/08\/chart-scaled.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/08\/chart-scaled.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/08\/chart-scaled.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":17243,"url":"https:\/\/msftnewsnow.com\/hackers-use-microsoft-365-office-docs\/","url_meta":{"origin":332585,"position":3},"title":"Hackers weaponizing Microsoft 365 Office documents to deploy malware and other attacks","author":"Dave W. Shanahan","date":"May 29, 2024","format":false,"excerpt":"The weaponization of Microsoft 365 Office documents by hackers underscores the need for heightened vigilance and robust cybersecurity practices. By understanding the methods used by cybercriminals and implementing comprehensive security measures, businesses can better protect themselves against these sophisticated attacks. Staying informed about the latest threats and continuously updating security\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"microsoft 365 office documents","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/pkusslapts2qpkwu0rnf.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/pkusslapts2qpkwu0rnf.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/pkusslapts2qpkwu0rnf.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/pkusslapts2qpkwu0rnf.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":20583,"url":"https:\/\/msftnewsnow.com\/microsoft-office-zero-day-cve-2024-38200\/","url_meta":{"origin":332585,"position":4},"title":"Microsoft Office zero-day vulnerability, CVE-2024-38200, exposes NTLM hashes to make it easy as pie for attackers to exploit","author":"Dave W. Shanahan","date":"August 12, 2024","format":false,"excerpt":"A newly discovered zero-day vulnerability in Microsoft Office, CVE-2024-38200, exposes NTLM hashes to attackers. Learn more about the vulnerability, mitigations, and fixes.","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft Office zero-day vulnerability, CVE-2024-38200, exposes NTLM hashes to make it easy as pie for attackers to exploit","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/08\/AdobeStock_784830317_Preview.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/08\/AdobeStock_784830317_Preview.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/08\/AdobeStock_784830317_Preview.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/08\/AdobeStock_784830317_Preview.jpeg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":18105,"url":"https:\/\/msftnewsnow.com\/outlook-bug-spoofs-microsoft-corporate-emails\/","url_meta":{"origin":332585,"position":5},"title":"Critical security law allows spoofing of Microsoft corporate emails, putting approximately 400 million Outlook users at risk worldwide","author":"Dave W. Shanahan","date":"June 24, 2024","format":false,"excerpt":"In a concerning development for Microsoft and its users, a security researcher has uncovered a significant vulnerability that allows malicious actors to impersonate Microsoft corporate emails. This flaw, which remains unpatched as of June 24, 2024, poses a severe threat to the approximately 400 million Outlook users worldwide.","rel":"","context":"In &quot;AI and Copilot&quot;","block_context":{"text":"AI and Copilot","link":"https:\/\/msftnewsnow.com\/ai-and-copilot\/"},"img":{"alt_text":"Critical security law allows spoofing of Microsoft corporate emails, putting approximately 400 million Outlook users at risk worldwide","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/06\/GQBKX79XEAAZStj-scaled.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/06\/GQBKX79XEAAZStj-scaled.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/06\/GQBKX79XEAAZStj-scaled.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/06\/GQBKX79XEAAZStj-scaled.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts\/332585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/users\/208461344"}],"replies":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/comments?post=332585"}],"version-history":[{"count":0,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts\/332585\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/media\/332619"}],"wp:attachment":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/media?parent=332585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/categories?post=332585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/tags?post=332585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}