

It is unfortunately quite common for hotel chains and others in the hospitality space to become the focus of cyberattacks due to the vast amount of valuable data these businesses process and store. TechRepublic: WordPress users beware: These 10 plugins are most vulnerable to attacks In a Q&A with HackerOne, Vaughn said an invitation-only program was launched first, which may account for the $5,650 in bug bounty rewards which have already been issued at the time of writing. "As one of the first global hospitality brands to launch this type of program, we extend the ways we care for our guests and deepen our commitment to protecting their sensitive information." "At Hyatt, protecting guest and customer information is our top priority and launching this program represents an important step that furthers our goal of keeping our guests safe every day," said Hyatt Chief Information Security Officer Benjamin Vaughn. Researchers who report valid, high-severity flaws can expect rewards of up to $4,000 important bugs will earn them $1,200 and less severe vulnerabilities are worth between $300 and $600. Hyatt has chosen to use the Common Vulnerability Scoring Standard (CVSS) standard to evaluate the severity of security flaws found. Novel origin IP address discovery, authentication bypass, back-end system access via front-end services, container escapes, SQL injections, cross-site request forgery, WAF bypass, and cross-site scripting (XSS) bugs will all be considered for rewards, among other issues.ĬNET: Twitter messages to Russian cybersecurity firm helped NSA leak probe The bug bounty program is public and includes the main domain, m.,, and both the iOS and Android Hyatt mobile apps. Ransomware: These two gangs are behind half of all attacksĮthical hackers can use the platform - as well as rival services such as Bugcrowd - to report vulnerabilities, security flaws, leaky servers and more before less well-intentioned individuals stumble across them, potentially leading to cyberattacks or data theft.The best browsers for privacy: Secure web browsing.

