Connect with us

Hi, what are you looking for?


Management & Strategy

Google Increases Bug Bounty Program Rewards

Google on Thursday informed security researchers that they can now earn significantly higher rewards if they submit vulnerability reports through the company’s bug bounty programs.

Google on Thursday informed security researchers that they can now earn significantly higher rewards if they submit vulnerability reports through the company’s bug bounty programs.

According to the tech giant, over 8,500 security bug reports have been received since the launch of its Chrome Vulnerability Rewards Program in 2010, and more than $5 million have been paid out to researchers.

The company has now decided to increase rewards across the board. For example, the maximum baseline reward has been tripled from $5,000 to $15,000 and high quality reports describing serious vulnerabilities can earn white hat hackers up to $30,000.

In the case of Chrome OS. an exploit chain that leads to a complete hack of Chromebook or Chromebox devices with persistence in guest mode is worth up to $150,000.

The payouts offered through the Google Play Security Reward Program have also increased. Experts can now receive up to $20,000 for remote code execution flaws (up from $5,000), and $3,000 for theft of private data or unauthorized access to protected components (up from $1,000). This program covers Android applications made by Google and other major companies, and its goal is to improve the security of the Google Play ecosystem.

While it has become increasingly difficult to find vulnerabilities in Google products — this is likely one of the reasons why the company has increased the bug bounty payouts — researchers still found some interesting security holes in recent months. This includes a cross-site scripting (XSS) vulnerability that could have been exploited to attack Google employees and possibly gain access to sensitive information, and an XSS flaw in Google Search.

Related: Facebook Pays $120,000 in Bounties at BountyCon

Advertisement. Scroll to continue reading.

Related: Researcher Earns $36,000 for Google App Engine Flaws

Related: Google Bug Bounty Program Now Covers Platform Abuse

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.