Tech. Sgt. Christopher Shamburger, 27th Special Operations Maintenance Squadron weapons load crew chief, logs in data into a computer during a weapons load on an MQ-9 Reaper aircraft at Cannon Air Force Base, N.M., Sept. 10, 2018. Shamburger is the lead crew member and is in the position of the ‘one-man’ role which is responsible for overseeing the entire load. (U.S. Air Force photo by Senior Airman Luke Kitterman)
Staff Sgt. Alek Albrecht participates in a Network War Bridge Course at the 39th Information Operations Squadron Sept. 19, 2014, Hurlburt Field, Fla. Albrecht is practicing to hack into a simulated network to better understand what techniques real hackers may use when attempting to infiltrate Air Force networks. Air Force Space Command provides trained and ready cyber forces to the warfighter through 24th Air Force. Albrecht is a Air Force Network Operations and Security Center enterprise network technician. (U.S. Air Force photo/Airman 1st Class Krystal Ardrey)
It's the "most inclusive" bug bounty program to date, meaning that foreign nationals — except those from China, Russia, Iran or North Korea — are welcome to…
Hacker Mathias Karlsson demonstrates a critical vulnerability discovery to Jeremy Morrow, Lance Cleghorn, James Garrett, and Tim Creech from the DMA Public Web team. (HackerOne photo)