Tech. Sgt. Christopher Shamburger, 27th Special Operations Maintenance Squadron weapons load crew chief, logs in data into a computer during a weapons load on an MQ-9 Reaper aircraft at Cannon Air Force Base, N.M., Sept. 10, 2018. Shamburger is the lead crew member and is in the position of the ‘one-man’ role which is responsible for overseeing the entire load. (U.S. Air Force photo by Senior Airman Luke Kitterman)
At Hack the Air Force 2.0, a live event. (HackerOne)
Staff Sgt. Alek Albrecht participates in a Network War Bridge Course at the 39th Information Operations Squadron Sept. 19, 2014, Hurlburt Field, Fla. Albrecht is practicing to hack into a simulated network to better understand what techniques real hackers may use when attempting to infiltrate Air Force networks. Air Force Space Command provides trained and ready cyber forces to the warfighter through 24th Air Force. Albrecht is a Air Force Network Operations and Security Center enterprise network technician. (U.S. Air Force photo/Airman 1st Class Krystal Ardrey)
It's the "most inclusive" bug bounty program to date, meaning that foreign nationals — except those from China, Russia, Iran or North Korea — are welcome to…
Hacker Mathias Karlsson demonstrates a critical vulnerability discovery to Jeremy Morrow, Lance Cleghorn, James Garrett, and Tim Creech from the DMA Public Web team. (HackerOne photo)
The service paid the security professionals, Brett Buerhaus and Mathias Karlsson, $10,650 for discovering a flaw.
Dec 18, 2017