Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Zoom Revamps Bug Bounty Program

Zoom Teams Up With Luta Security to Revamp Bug Bounty Program

Zoom announced on Wednesday that it has teamed up with Katie Moussouris’ company, Luta Security, to revamp its bug bounty program.

Zoom Teams Up With Luta Security to Revamp Bug Bounty Program

Zoom announced on Wednesday that it has teamed up with Katie Moussouris’ company, Luta Security, to revamp its bug bounty program.

Zoom announced on April 1 that it would be making significant changes to its bug bounty program, after experts raised concerns about Zoom security and researchers reported finding potentially serious vulnerabilities in the video conferencing service.

Zoom has now announced some of the steps it plans on taking to improve its bug bounty program. The company has joined forces with Luta Security, which will help it obtain feedback on its current program.

Luta Security founder Katie Moussouris is well known for launching and improving bug bounty programs. Moussouris helped Microsoft launch its bug bounty programs and she also worked for bug bounty platform provider HackerOne, including when the Pentagon launched its first bug bounty initiative.

Moussouris says her company has been working with Zoom since last summer “to assess the functional health and sustainability of their existing bug bounty programs, and the internal engineering processes needed to run it.”

Luta and Zoom are now asking for feedback on the current bug bounty program, information that they will use to “re-architect Zoom’s bug bounty and vulnerability disclosure programs, and help get Zoom’s overall security house in order.”

Zoom said on Wednesday that it has also brought in other “world-class experts” to help secure and enhance its solutions. One of them is Alex Stamos, Facebook’s former CSO, who has joined the company as an outside advisor.

Advertisement. Scroll to continue reading.

Vice has reported that someone is claiming to have a zero-day exploit affecting the Zoom app for Windows, and they’re asking $500,000 for it. The remote code execution exploit allegedly requires the hacker to be in a call with the targeted user. Zoom says it has launched an investigation, but so far it has “not found any evidence substantiating these claims.”

Researchers also reported earlier this month that they had identified a Zoom credentials database on the dark web.

Related: Zoom’s Security and Privacy Woes Violated GDPR, Expert Says

Related: Keys Used to Encrypt Zoom Meetings Sent to China

Related: Trojanized Zoom Apps Target Remote Workers

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem