Connect with us

Hi, what are you looking for?


Management & Strategy

Singapore Government Announces Third Bug Bounty Program

Singapore on Monday announced its third bug bounty program aimed at testing the security of public-facing government systems.

Singapore on Monday announced its third bug bounty program aimed at testing the security of public-facing government systems.

The latest bug bounty program, similar to the previous two, will be hosted by HackerOne. The project is conducted in collaboration with the Cyber Security Agency of Singapore (CSA) and the Government Technology Agency of Singapore (GovTech).

HackerOne will invite approximately 200 international hackers and 100 local hackers to take part in the challenge, which offers payouts between $250 and $10,000 per vulnerability report. The program will run from July to August and results will be announced in September.

The bug bounty program will cover nine Internet-accessible government services that are widely used by the public. The project, according to organizers, is “part of a strategic initiative and commitment to build a secure and resilient Smart Nation by strengthening collaboration with the cybersecurity industry and community.”

The first bug bounty program conducted by the government of Singapore, specifically its Ministry of Defence (MINDEF), took place in early 2018 and it resulted in 35 vulnerabilities being found and nearly $15,000 being paid out to participants.

The second program took place earlier this year and it resulted in the discovery of 26 security holes and payouts totaling nearly $12,000.

Singapore hosts SecurityWeek’s ICS Cyber Security Conference, an event dedicated to serving critical infrastructure and industrial internet stakeholders in the APAC region.

Advertisement. Scroll to continue reading.

Related: Singapore Signs Cybersecurity Agreements With US, Canada

Related: Facebook and Google Launch Asia-Pacific Bug Hunting Conference

Related: Two White Hats Earn Over $1 Million via Bug Bounty Programs

Related: Facebook Pays $120,000 in Bounties at BountyCon

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.