{"id":354048,"date":"2025-08-01T09:16:37","date_gmt":"2025-08-01T13:16:37","guid":{"rendered":"https:\/\/msftnewsnow.com\/?p=354048"},"modified":"2025-08-01T09:18:15","modified_gmt":"2025-08-01T13:18:15","slug":"microsoft-supercharges-dotnet-bounty-program-40000","status":"publish","type":"post","link":"https:\/\/msftnewsnow.com\/microsoft-supercharges-dotnet-bounty-program-40000\/","title":{"rendered":"Microsoft Supercharges .NET Bounty Program: Up to $40,000 Now Offered for Top Vulnerabilities"},"content":{"rendered":"<div class=\"relative\">\n<div class=\"prose text-pretty dark:prose-invert inline leading-normal break-words min-w-0 [word-break:break-word]\">\n<p class=\"my-0\"><a href=\"https:\/\/msftnewsnow.com\/tag\/microsoft\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a> has officially expanded and enhanced the .NET Bounty Program, now offering up to $40,000 in awards for eligible vulnerability reports impacting .NET and ASP.NET Core (including Blazor and Aspire). This move, <a href=\"https:\/\/msrc.microsoft.com\/blog\/2025\/07\/.net-bounty-program-now-offers-up-to-40000-in-awards\/\" target=\"_blank\" rel=\"noopener\">effective July 31, 2025<\/a>, marks the largest reward increase since the program&#8217;s inception and underscores Microsoft&#8217;s commitment to improving the security of its software ecosystem through community collaboration<span class=\"whitespace-nowrap\">.<\/span><\/p>\n<h2 class=\"mb-xs mt-5 text-base font-[500] first:mt-0 dark:font-[475]\"><strong>Expanded Scope: Broader .NET Ecosystem Coverage<\/strong><\/h2>\n<p><img decoding=\"async\" data-attachment-id=\"354084\" data-permalink=\"https:\/\/msftnewsnow.com\/microsoft-supercharges-dotnet-bounty-program-40000\/research\/#main\" data-orig-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-orig-size=\"651,720\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"research\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-large-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" class=\"alignnone size-full wp-image-354084\" src=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" alt=\"Microsoft Supercharges .NET Bounty Program: Up to $40,000 Now Offered for Top Vulnerabilities\" width=\"651\" height=\"720\" srcset=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 651w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-136x150.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 136w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=260&amp;ssl=1 260w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=390&amp;ssl=1 390w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=520&amp;ssl=1 520w\" sizes=\"(max-width: 651px) 100vw, 651px\" \/><\/p>\n<p class=\"my-0\">The newly enhanced .NET Bounty Program dramatically widens its scope to cover more of the .NET technology stack. The expansion means eligible submissions now include:<\/p>\n<ul class=\"marker:text-textOff list-disc\">\n<li>\n<p class=\"my-0\">All supported versions of .NET and ASP.NET.<\/p>\n<\/li>\n<li>\n<p class=\"my-0\">Adjacent technologies such as F#.<\/p>\n<\/li>\n<li>\n<p class=\"my-0\">Supported versions of ASP.NET Core for .NET Framework.<\/p>\n<\/li>\n<li>\n<p class=\"my-0\">Templates provided with supported .NET and ASP.NET Core versions.<\/p>\n<\/li>\n<li>\n<p class=\"my-0\">GitHub Actions in the .NET and ASP.NET Core repositories.<\/p>\n<\/li>\n<\/ul>\n<p class=\"my-0\">This broader coverage ensures continuous, proactive security review across the full range of development technologies that modern organizations and enterprises rely on, while also supporting community-driven innovation.<\/p>\n<h2 class=\"mb-xs mt-5 text-base font-[500] first:mt-0 dark:font-[475]\"><strong>Restructured Rewards: A Transparent, Impact-Driven Framework<\/strong><\/h2>\n<p class=\"my-0\">Microsoft\u2019s restructured award system is now designed to not only incentivize high-quality research, but also clarify the value of different types and severities of vulnerabilities:<\/p>\n<ul class=\"marker:text-textOff list-disc\">\n<li>\n<p class=\"my-0\"><strong>Awards are now based on the potential impact of a vulnerability<\/strong>, with higher-impact, exploit-ready flaws resulting in greater rewards.<\/p>\n<\/li>\n<li>\n<p class=\"my-0\"><strong>Impact categories now align with other Microsoft bounty programs<\/strong>, ensuring consistency and fairness in how submissions are evaluated<span class=\"whitespace-nowrap\">.<\/span><\/p>\n<\/li>\n<li>\n<p class=\"my-0\"><strong>Clear severity levels<\/strong>\u2014such as \u201cCritical,\u201d \u201cImportant,\u201d and specific exploit categories\u2014help researchers focus on the most meaningful threats.<\/p>\n<\/li>\n<li>\n<p class=\"my-0\">Eligible submissions are rated as either \u201ccomplete\u201d (includes fully functional exploits) or \u201cnot complete\u201d (theoretical or partial), ensuring detailed, actionable reporting is recognized with the highest rewards.<\/p>\n<\/li>\n<\/ul>\n<p class=\"my-0\">Here\u2019s how rewards break down by impact and submission quality:<\/p>\n<div class=\"group relative\">\n<div class=\"w-full overflow-x-auto md:max-w-[90vw] border-borderMain\/50 ring-borderMain\/50 divide-borderMain\/50 dark:divide-borderMainDark\/50 dark:ring-borderMainDark\/50 dark:border-borderMainDark\/50 bg-transparent\">\n<table class=\"border-borderMain my-[1em] w-full table-auto border\">\n<thead class=\"bg-offset\">\n<tr>\n<th class=\"border-borderMain px-sm py-sm dark:border-borderMainDark break-normal border text-left align-top\">Security Impact<\/th>\n<th class=\"border-borderMain px-sm py-sm dark:border-borderMainDark break-normal border text-left align-top\">Report Quality<\/th>\n<th class=\"border-borderMain px-sm py-sm dark:border-borderMainDark break-normal border text-left align-top\">Critical<\/th>\n<th class=\"border-borderMain px-sm py-sm dark:border-borderMainDark break-normal border text-left align-top\">Important<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Remote Code Execution<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Complete<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$40,000<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$30,000<\/td>\n<\/tr>\n<tr>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\"><\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Not Complete<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$20,000<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$20,000<\/td>\n<\/tr>\n<tr>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Elevation of Privilege<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Complete<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$40,000<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$10,000<\/td>\n<\/tr>\n<tr>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\"><\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Not Complete<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$20,000<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$4,000<\/td>\n<\/tr>\n<tr>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Security Feature Bypass<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Complete<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$30,000<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$10,000<\/td>\n<\/tr>\n<tr>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\"><\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Not Complete<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$20,000<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$4,000<\/td>\n<\/tr>\n<tr>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Remote Denial of Service<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Complete<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$20,000<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$10,000<\/td>\n<\/tr>\n<tr>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\"><\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Not Complete<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$15,000<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$4,000<\/td>\n<\/tr>\n<tr>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Spoofing or Tampering<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Complete<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$10,000<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$5,000<\/td>\n<\/tr>\n<tr>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\"><\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Not Complete<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$7,000<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$3,000<\/td>\n<\/tr>\n<tr>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Information Disclosure<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Complete<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$10,000<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$5,000<\/td>\n<\/tr>\n<tr>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\"><\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Not Complete<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$7,000<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$3,000<\/td>\n<\/tr>\n<tr>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Insecure Documentation\/Samples<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Complete<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$10,000<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$5,000<\/td>\n<\/tr>\n<tr>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\"><\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">Not Complete<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$7,000<\/td>\n<td class=\"border-borderMain px-sm dark:border-borderMainDark min-w-[48px] break-normal border\">$3,000<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"px-two bg-background border-border shadow-subtle pointer-coarse:opacity-100 right-xs absolute bottom-0 flex gap-2 rounded-lg border py-px opacity-0 transition-opacity group-hover:opacity-100\">\n<div>\n<div class=\"flex items-center min-w-0 font-medium gap-1 justify-center\">\n<div class=\"flex shrink-0 items-center justify-center size-3.5\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p class=\"my-0\"><strong><em>Note: \u201cComplete\u201d submissions require a fully functional exploit; \u201cNot Complete\u201d covers plausible but not fully demonstrated issues.<\/em><\/strong><\/p>\n<h2 class=\"mb-xs mt-5 text-base font-[500] first:mt-0 dark:font-[475]\"><strong>Stronger Security for All<\/strong><\/h2>\n<p class=\"my-0\">This enhanced incentive structure rewards security researchers for finding flaws in key .NET platforms, including the highly popular ASP.NET Core, Blazor, and Aspire. With legacy and bleeding-edge technologies now both in-scope, Microsoft is ensuring ongoing security vigilance across the platforms that power enterprise applications, public websites, and cloud services.<\/p>\n<p class=\"my-0\">The reimagined program is also transparent about how bounties are calculated. By matching security impact types with other Microsoft bounty programs, researchers gain better insight into how to maximize their contributions\u2014and rewards. The approach also encourages submission of well-documented, actionable reports that lead directly to measurable improvements in Microsoft software security.<\/p>\n<h2 class=\"mb-xs mt-5 text-base font-[500] first:mt-0 dark:font-[475]\"><strong>How to Participate: Making the .NET World Safer Together<\/strong><\/h2>\n<p class=\"my-0\">If you\u2019re a security researcher, ethical hacker, or developer, <a href=\"https:\/\/msrc.microsoft.com\/report\/vulnerability\/new?c=bounty\" target=\"_blank\" rel=\"noopener\">submitting qualifying vulnerability reports is as simple as<\/a>:<\/p>\n<ol class=\"marker:text-textOff list-decimal\">\n<li>\n<p class=\"my-0\">Identifying a vulnerability in an in-scope .NET technology (see above).<\/p>\n<\/li>\n<li>\n<p class=\"my-0\">Preparing a detailed submission, with extra rewards for complete, proof-of-concept exploits.<\/p>\n<\/li>\n<li>\n<p class=\"my-0\">Filing your report via the Microsoft Security Response Center platform.<\/p>\n<\/li>\n<\/ol>\n<p class=\"my-0\">All valid vulnerability reports help Microsoft further secure its products for its global customer base\u2014and, with the top-tier payout now at $40,000, the incentives are higher than ever before.<\/p>\n<h2 class=\"mb-xs mt-5 text-base font-[500] first:mt-0 dark:font-[475]\"><strong>A Commitment to the Research Community<\/strong><\/h2>\n<p><img decoding=\"async\" data-attachment-id=\"354084\" data-permalink=\"https:\/\/msftnewsnow.com\/microsoft-supercharges-dotnet-bounty-program-40000\/research\/#main\" data-orig-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-orig-size=\"651,720\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"research\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-large-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" class=\"alignnone size-full wp-image-354084\" src=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" alt=\"Microsoft Supercharges .NET Bounty Program: Up to $40,000 Now Offered for Top Vulnerabilities\" width=\"651\" height=\"720\" srcset=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 651w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-136x150.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 136w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=260&amp;ssl=1 260w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=390&amp;ssl=1 390w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/08\/research-scaled.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=520&amp;ssl=1 520w\" sizes=\"(max-width: 651px) 100vw, 651px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p class=\"my-0\">Microsoft\u2019s regular enhancements to its bug bounty programs are driven by the realization that security is an ever-evolving team effort. \u201cYour contributions are essential to strengthening the security of .NET, and we look forward to your future submissions,\u201d <a href=\"https:\/\/msrc.microsoft.com\/blog\/2025\/07\/.net-bounty-program-now-offers-up-to-40000-in-awards\/\" target=\"_blank\" rel=\"noopener\">notes Microsoft in its latest update<\/a><span class=\"whitespace-nowrap\">.<\/span> This program not only helps keep software safer, but also ensures that researchers are fairly recognized for their crucial work.<\/p>\n<p class=\"my-0\">Microsoft\u2019s decision to dramatically expand the .NET Bounty Program\u2019s rewards and scope is a win-win for developers, researchers, and all users of the .NET ecosystem. The significant rewards underscore the value of community-driven security efforts and reflect the increasing complexity\u2014and essential importance\u2014of application-layer defense. If you\u2019re ready to make a difference and potentially earn a substantial reward, now is the time to engage with Microsoft\u2019s .NET Bounty Program.<\/p>\n<p class=\"my-0\">Ready to submit your discovery or learn more? <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/bounty\" target=\"_blank\" rel=\"noopener\">Visit the Microsoft Security Response Center Bug Bounty Programs<\/a> page or <a href=\"https:\/\/msrc.microsoft.com\/blog\/2025\/07\/.net-bounty-program-now-offers-up-to-40000-in-awards\/\" target=\"_blank\" rel=\"noopener\">read the official blog post for complete terms and resources<\/a>.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has officially expanded and enhanced the .NET Bounty Program, now offering up to $40,000 in awards for eligible vulnerability reports impacting .NET and ASP.NET Core (including Blazor and Aspire). This move, effective July 31, 2025, marks the largest reward increase since the program&#8217;s inception and underscores Microsoft&#8217;s commitment to improving the security of its &#8230; <a title=\"Microsoft Supercharges .NET Bounty Program: Up to $40,000 Now Offered for Top Vulnerabilities\" class=\"read-more\" href=\"https:\/\/msftnewsnow.com\/microsoft-supercharges-dotnet-bounty-program-40000\/\" aria-label=\"Read more about Microsoft Supercharges .NET Bounty Program: Up to $40,000 Now Offered for Top Vulnerabilities\">Read more<\/a><\/p>\n","protected":false},"author":208461344,"featured_media":354082,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[24,2540],"tags":[761,1035,778,2181,1083],"class_list":["post-354048","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security","tag-developer","tag-github","tag-microsoft","tag-microsoft-security","tag-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/msftnewsnow.com\/wp-content\/uploads\/2025\/08\/chart-scaled.jpg","jetpack_shortlink":"https:\/\/wp.me\/pfgCZY-1u6s","jetpack-related-posts":[{"id":332585,"url":"https:\/\/msftnewsnow.com\/msrc-record-60-million-in-bug-bounties\/","url_meta":{"origin":354048,"position":0},"title":"Microsoft&#8217;s Security Response Center (MSRC) Reveals Comprehensive Vulnerability Management Strategy with Record $60+ Million in Bug Bounties","author":"Dave W. Shanahan","date":"March 14, 2025","format":false,"excerpt":"Microsoft has intensified its commitment to vulnerability management through the Microsoft Security Response Center (MSRC). According to a detailed blog post published yesterday, the MSRC serves as the central hub for investigating vulnerabilities, coordinating their disclosure, and releasing critical security updates to protect both customers and Microsoft's infrastructure from emerging\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"msrc","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/03\/unnamed.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/03\/unnamed.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/03\/unnamed.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/03\/unnamed.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10993,"url":"https:\/\/msftnewsnow.com\/binaryformatter-removed-dotnet-9\/","url_meta":{"origin":354048,"position":1},"title":"Now obsolete, BinaryFormatter getting removed in upcoming .NET 9 release","author":"Dave W. Shanahan","date":"February 10, 2024","format":false,"excerpt":"A significant change in the .NET ecosystem was announced: the BinaryFormatter serialization method will be removed in an upcoming.NET release. This decision, detailed in a recent GitHub issue post, marks the culmination of a phased obsoletion strategy aimed at enhancing security within .NET applications.","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"binaryformatter","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/02\/ea40a181-aa4d-475c-813f-a1435ae12857.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/02\/ea40a181-aa4d-475c-813f-a1435ae12857.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/02\/ea40a181-aa4d-475c-813f-a1435ae12857.jpeg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":17075,"url":"https:\/\/msftnewsnow.com\/epic-net-dotnet-news-at-msft-build-24\/","url_meta":{"origin":354048,"position":2},"title":"Here are the epic .NET (dotnet) announcements made at Microsoft Build 2024, including .NET Aspire, AI, and more","author":"Dave W. Shanahan","date":"May 24, 2024","format":false,"excerpt":"Microsoft Build 2024 has once again demonstrated the company\u2019s commitment to empowering developers with cutting-edge tools and technologies. The announcements around .NET 9, AI integration, .NET Aspire, C# 13, performance improvements, and enhanced libraries and frameworks underscore Microsoft\u2019s vision for the future of software development.","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":".net dotnet","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/build-2024-feature-1024x576-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/build-2024-feature-1024x576-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/build-2024-feature-1024x576-1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/build-2024-feature-1024x576-1.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":346158,"url":"https:\/\/msftnewsnow.com\/microsoft-launches-free-european-security-program\/","url_meta":{"origin":354048,"position":3},"title":"Microsoft Launches European Security Program: Free Cybersecurity Initiative to Protect European Governments from AI-Driven Threats","author":"Dave W. Shanahan","date":"June 4, 2025","format":false,"excerpt":"Microsoft has announced the launch of its European Security Program, a comprehensive cybersecurity initiative offered free of charge to European governments. The program, unveiled at a high-profile event in Berlin on June 4, 2025, highlights Microsoft\u2019s commitment to fortifying Europe\u2019s digital infrastructure against increasingly sophisticated digital threats. Responding to a\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft launches new European Security Program","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/image-12.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/image-12.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/image-12.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2025\/06\/image-12.jpeg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":18938,"url":"https:\/\/msftnewsnow.com\/july-2024-patch-tuesday-update-142-vulnerabilities\/","url_meta":{"origin":354048,"position":4},"title":"Microsoft releases critical July 2024 Patch Tuesday updates, addressing 142 vulnerabilities","author":"Dave W. Shanahan","date":"July 9, 2024","format":false,"excerpt":"The July 2024 Patch Tuesday underscores the ongoing importance of regular security updates in the face of evolving cyber threats. With 142 vulnerabilities addressed, including critical and actively exploited flaws, it's crucial for users and administrators to apply these updates as soon as possible to maintain the security of their\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft releases critical July 2024 Patch Tuesday updates, addressing 142 vulnerabilities","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/07\/un2ya4gejp8770e67u7p.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/07\/un2ya4gejp8770e67u7p.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/07\/un2ya4gejp8770e67u7p.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/07\/un2ya4gejp8770e67u7p.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10452,"url":"https:\/\/msftnewsnow.com\/microsoft-end-of-support-2024\/","url_meta":{"origin":354048,"position":5},"title":"Microsoft end of support 2024: Navigating the transition and preparing for what&#8217;s new and what&#8217;s next","author":"Dave W. Shanahan","date":"February 4, 2024","format":false,"excerpt":"Microsoft has recently announced its end of support schedule for several products in 2024. This means that these products will no longer receive security updates, non-security updates, free or paid assisted support options, or online technical content updates.","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"microsoft end of support 2024","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/02\/abe4c475-1625-443d-a27e-b8583cd678fd.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/02\/abe4c475-1625-443d-a27e-b8583cd678fd.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/02\/abe4c475-1625-443d-a27e-b8583cd678fd.jpeg?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts\/354048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/users\/208461344"}],"replies":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/comments?post=354048"}],"version-history":[{"count":0,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts\/354048\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/media\/354082"}],"wp:attachment":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/media?parent=354048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/categories?post=354048"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/tags?post=354048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}