{"id":216,"date":"2020-05-02T08:46:16","date_gmt":"2020-05-02T08:46:16","guid":{"rendered":"http:\/\/www.cyberlaws.org\/?page_id=216"},"modified":"2021-07-29T05:36:47","modified_gmt":"2021-07-29T05:36:47","slug":"bug-bounty-programs","status":"publish","type":"page","link":"http:\/\/www.cyberlaws.org\/bug-bounty-programs\/","title":{"rendered":"Large Companies and Organizations that have their own bug bounty programs"},"content":{"rendered":"

List of bug Bounty Program\u00a0 & Relevant links<\/span><\/h1>\n

Bug bounty hunters will always need this information useful<\/span><\/h2>\n

BUG Bounty Program is a deal offered by software companies, by which individuals get rewarded for reporting flaws, vulnerabilities, security leaks in the software applications.<\/span><\/p>\n

==================================================================<\/p>\n

APPLE<\/p>\n

https:\/\/support.apple.com\/en-us\/HT201220<\/a><\/p>\n

APACHE<\/p>\n

https:\/\/www.apache.org\/security\/<\/a><\/p>\n

BITDEFENDER<\/p>\n

https:\/\/www.bitdefender.com\/site\/view\/bug-bounty.html<\/a><\/p>\n

GOOGLE<\/p>\n

https:\/\/www.google.com\/about\/appsecurity\/reward-program\/<\/a><\/p>\n

GOOGLE -Bug Hunter University<\/p>\n

https:\/\/bughunters.google.com\/learn<\/a><\/p>\n

FACEBOOK<\/p>\n

https:\/\/www.facebook.com\/BugBounty\/<\/a><\/p>\n

https:\/\/www.facebook.com\/whitehat\/<\/a><\/p>\n

LINKEDIN<\/p>\n

https:\/\/engineering.linkedin.com\/blog\/2015\/06\/private-bug-bounty-program<\/a><\/p>\n

MICROSOFT<\/p>\n

https:\/\/www.microsoft.com\/en-us\/msrc\/bounty<\/a><\/p>\n

INTEL<\/p>\n

https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/bug-bounty-program.html<\/a><\/p>\n

IKEA<\/p>\n

https:\/\/www.ikea.com\/es\/en\/customer-service\/bug-bounty-program-pubf110a501<\/a><\/p>\n

YAHOO<\/p>\n

https:\/\/safety.yahoo.com\/Security\/REPORTING-ISSUES.html<\/a><\/p>\n

WORDPRESS<\/p>\n

https:\/\/make.wordpress.org\/core\/handbook\/testing\/reporting-bugs\/<\/a><\/p>\n

CISCO<\/p>\n

https:\/\/tools.cisco.com\/security\/center\/resources\/security_vulnerability_policy.html<\/a><\/p>\n

MOZILLA<\/p>\n

https:\/\/www.mozilla.org\/en-US\/security\/bug-bounty\/<\/a><\/p>\n

NORDVPN<\/p>\n

https:\/\/nordvpn.com\/blog\/bug-bounty-program-launch\/<\/a><\/p>\n

VIIMEO<\/p>\n

https:\/\/vimeo.com\/about\/security<\/a><\/p>\n

PAYTM<\/p>\n

https:\/\/bugbounty.paytm.com\/<\/a><\/p>\n

PEGA<\/p>\n

https:\/\/www.pega.com\/responsible-disclosure-policy<\/a><\/p>\n

PHP<\/p>\n

https:\/\/bugs.php.net\/report.php?bug_type=Security<\/a><\/p>\n

PORKBUN<\/p>\n

https:\/\/porkbun.com\/products\/bug_bounty<\/a><\/p>\n

SAP<\/p>\n

https:\/\/www.sap.com\/about\/trust-center\/incident-management.html<\/a><\/p>\n

SHOPIFY<\/p>\n

https:\/\/www.shopify.in\/whitehat<\/a><\/p>\n

SPOTIFY<\/p>\n

https:\/\/www.spotify.com\/in\/bounty\/<\/a><\/p>\n

SNAPCHAT<\/p>\n

https:\/\/support.snapchat.com\/en-US\/a\/shake-to-report<\/a><\/p>\n

STARBUCKS<\/p>\n

https:\/\/www.starbucks.com\/whitehat<\/a><\/p>\n

TENCENT<\/p>\n

https:\/\/en.security.tencent.com\/<\/a><\/p>\n

TWITTER<\/p>\n

https:\/\/help.twitter.com\/en\/rules-and-policies\/reporting-security-vulnerabilities<\/a><\/p>\n

OLACABS<\/p>\n

https:\/\/whitehat.olacabs.com\/<\/a><\/p>\n

ORONIC<\/p>\n

https:\/\/oroinc.com\/bug-bounty\/<\/a><\/p>\n

GITHUB<\/p>\n

https:\/\/bounty.github.com\/<\/a><\/p>\n

QUORA<\/p>\n

https:\/\/www.quora.com\/q\/quoraengineering\/Security-Bug-Bounty-Program<\/a><\/p>\n

MOBIKWIK<\/p>\n

https:\/\/www.mobikwik.com\/bug-bounty\/guidelines<\/a><\/p>\n

More Links Coming Soon \u2026<\/p>\n

If you wish to share information, which should be a part of this Page, Please email us at:\u00a0team@cyberlaws.org<\/a><\/p>\n

 <\/p>\n

Other\u00a0 Links :<\/h2>\n

Bug Bounty Programs For Cryptocurrency<\/a><\/p>\n

https:\/\/www.cyberlaws.org\/certs-worldwide\/<\/a><\/p>\n

 <\/p>\n

NEWS<\/h2>\n