* [Cybersecurity Operations](/cybersecurity-operations)SOFTSWISS Expands Bug Bounty Program SOFTSWISS Expands Bug Bounty Program=========================================================================
November 1, 2024 2 Min Read [](https://www.linkedin.com/sharing/share-offsite/?url=https://www.darkreading.com/cybersecurity-operations/softswiss-expands-bug-bounty-program)[](http://www.facebook.com/sharer/sharer.php?u=https://www.darkreading.com/cybersecurity-operations/softswiss-expands-bug-bounty-program)[](http://www.twitter.com/intent/tweet?url=https://www.darkreading.com/cybersecurity-operations/softswiss-expands-bug-bounty-program)[](/cdn-cgi/l/email-protection#340b4741565e51574009677b726067637d676714714c44555a50471476415314765b415a404d1464465b53465559125559440f565b504d097d110604405c5b41535c40110604405c51110604525b58585b435d5a5311060452465b591106047055465f110604665155505d5a53110604595d535c401106045d5a4051465147401106044d5b411a110470110475110470110475110604677b726067637d6767110604714c44555a5047110604764153110604765b415a404d11060464465b534655591104701104755c404044471107751106721106724343431a5055465f465155505d5a531a575b59110672574d56514647515741465d404d195b44514655405d5b5a47110672475b524047435d474719514c44555a50471956415319565b415a404d1944465b53465559)[](https://www.reddit.com/submit?url=https://www.darkreading.com/cybersecurity-operations/softswiss-expands-bug-bounty-program&title=SOFTSWISS%20Expands%20Bug%20Bounty%20Program) PRESS RELEASEGZIRA, Malta, Oct. 30, 2024 /PRNewswire/ — [SOFTSWISS](https://www.softswiss.com/?utm_source=media&utm_medium=nw&utm_campaign=bug-bounty), a leading software supplier in the iGaming industry, joins Cybersecurity Awareness Month. The company is enhancing its cybersecurity efforts by leveraging the expertise of white-hat hackers and independent security researchers, inviting them to participate in its private Bug Bounty Program.The program requires experts to identify vulnerabilities and ensure the highest level of security for SOFTSWISS clients. To ensure that only significant cases that meet specific requirements are reported, SOFTSWISS launched a private program with invitation-only access.Invitation-only programs encourage white hat hackers to pay close attention to their terms and requirements, resulting in higher-quality reports. While public programs can offer broader perspectives but tend to generate more irrelevant reports, the private launch ensures that the focus remains on critical security issues.The Bug Bounty Program offers various financial incentives, depending on the severity and complexity of the discovered vulnerabilities. This program serves as an additional layer of defence, providing external, unbiased assessments from highly skilled security experts.’We care about the security of our clients and their players, which is why it is important for us not only to pay close attention to protecting the products we develop but also to constantly recheck our applications with the help of skilled external experts and enthusiasts. In collaboration with the expert community, we can ensure a reliable level of data protection and uninterrupted operations for all our clients,’ said Evgeny Zaretskov, Group Chief Information Security Officer at SOFTSWISS. ‘SOFTSWISS is proud to set a new standard for cybersecurity by leveraging crowdsourced expertise. In this ever-evolving landscape, even a minor bug can lead to significant losses for operators. The Bug Bounty Program is an extra measure to protect our existing and future clients.’The program has started with two products in the SOFTSWISS portfolio. It is conducted in a dedicated test environment, which operates independently of the iGaming project systems, ensuring no disruption to player experience or platform performance.Moving forward, the [SOFTSWISS](https://www.softswiss.com/?utm_source=media&utm_medium=nw&utm_campaign=bug-bounty) cybersecurity team plans to broaden the frames, adding more products and refining requirements to maintain the highest standards of security across all platforms.SOFTSWISS is an international tech company with over 15 years of experience developing innovative solutions for iGaming. The company revolutionised the industry by introducing the world’s first Bitcoin-optimised solution for iGaming. [](https://www.linkedin.com/sharing/share-offsite/?url=https://www.darkreading.com/cybersecurity-operations/softswiss-expands-bug-bounty-program)[](http://www.facebook.com/sharer/sharer.php?u=https://www.darkreading.com/cybersecurity-operations/softswiss-expands-bug-bounty-program)[](http://www.twitter.com/intent/tweet?url=https://www.darkreading.com/cybersecurity-operations/softswiss-expands-bug-bounty-program)[](/cdn-cgi/l/email-protection#251a5650474f40465118766a637176726c767605605d55444b41560567504205674a504b515c0575574a42574448034448551e474a415c186c001715514d4a50424d51001715514d40001715434a49494a524c4b4200171543574a480017156144574e001715774044414c4b42001715484c424d510017154c4b5140574056510017155c4a500b001561001564001561001564001715766a637176726c7676001715605d55444b4156001715675042001715674a504b515c00171575574a425744480015610015644d515155560016640017630017635252520b4144574e574044414c4b420b464a48001763465c47405756404650574c515c084a55405744514c4a4b56001763564a435156524c565608405d55444b41560847504208474a504b515c0855574a42574448)[](https://www.reddit.com/submit?url=https://www.darkreading.com/cybersecurity-operations/softswiss-expands-bug-bounty-program&title=SOFTSWISS%20Expands%20Bug%20Bounty%20Program) Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. [Subscribe](https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi)You May Also Like*** ** * ** ***More Insights Webinars* [Transform Your Security Operations And Move Beyond Legacy SIEM](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_palo243&ch=SBX&cid=_upcoming_webinars_8.500001500&_mc=_upcoming_webinars_8.500001500)Nov 6, 2024* [Unleashing AI to Assess Cyber Security Risk](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_dark71&ch=SBX&cid=_upcoming_webinars_8.500001492&_mc=_upcoming_webinars_8.500001492)Nov 12, 2024* [Securing Tomorrow, Today: How to Navigate Zero Trust](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7186&ch=SBX&cid=_upcoming_webinars_8.500001490&_mc=_upcoming_webinars_8.500001490)Nov 13, 2024* [The State of Attack Surface Management (ASM), Featuring Forrester](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7317&ch=SBX&cid=_upcoming_webinars_8.500001501&_mc=_upcoming_webinars_8.500001501)Nov 15, 2024* [Applying the Principle of Least Privilege to the Cloud](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_wiza60&ch=SBX&cid=_upcoming_webinars_8.500001499&_mc=_upcoming_webinars_8.500001499)Nov 18, 2024[More Webinars](/resources?types=Webinar) ### Editor’s Choice[A job classifieds newspaper ![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte25dc75c91574848/6723cae10ab4443f50b9047d/jobs-Helen_Sessions-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/application-security/cybersecurity-job-market-stagnates-dissatisfaction-abounds)[Application Security](/application-security) [Cybersecurity Job Market Stagnates, Dissatisfaction Abounds](/application-security/cybersecurity-job-market-stagnates-dissatisfaction-abounds)[Cybersecurity Job Market Stagnates, Dissatisfaction Abounds](/application-security/cybersecurity-job-market-stagnates-dissatisfaction-abounds) by[Tara Seals, Managing Editor, News, Dark Reading](/author/tara-seals) Oct 31, 2024 4 Min Read [CrowdStrike logo on a cellphone screen ![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd5b6b5acba4421a3/66a7eb4a06ddc84394436d14/Crowdstrike(1800)_SOPA_Images_Limited_Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/vulnerabilities-threats/case-against-abandoning-crowdstrike-post-outage)[Vulnerabilities -& Threats](/vulnerabilities-threats) [The Case Against Abandoning CrowdStrike Post-Outage](/vulnerabilities-threats/case-against-abandoning-crowdstrike-post-outage)[The Case Against Abandoning CrowdStrike Post-Outage](/vulnerabilities-threats/case-against-abandoning-crowdstrike-post-outage) by[Vishaal ‘V8’ Hariprasad](/author/vishaal-v8-hariprasad) Oct 31, 2024 5 Min Read [Chinese Navy guided-missile destroyer Xian steams ahead ![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2406b312c8c87fcf/6722a0dee4d8441ebc87ca84/China_navy-US_Navy_Photo-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/cyberattacks-data-breaches/china-seabed-sentinels-spying-trump-taps)[Cyberattacks -& Data Breaches](/cyberattacks-data-breaches) [China Says Seabed Sentinels Are Spying, After Trump Taps](/cyberattacks-data-breaches/china-seabed-sentinels-spying-trump-taps)[China Says Seabed Sentinels Are Spying, After Trump Taps](/cyberattacks-data-breaches/china-seabed-sentinels-spying-trump-taps) by[Tara Seals, Managing Editor, News, Dark Reading](/author/tara-seals) Oct 31, 2024 4 Min Read Reports* [Managing Third-Party Risk Through Situational Awareness](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_cybo171&ch=&cid=_analytics_7.300006016&_mc=_analytics_7.300006016)Jul 31, 2024* [2024 InformationWeek US IT Salary Report](https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_ingg253&ch=sbx&cid=_analytics_7.300006014&_mc=_analytics_7.300006014)May 29, 2024[More Reports](/resources?types=Report) Webinars* [Transform Your Security Operations And Move Beyond Legacy SIEM](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_palo243&ch=SBX&cid=_upcoming_webinars_8.500001500&_mc=_upcoming_webinars_8.500001500)Nov 6, 2024* [Unleashing AI to Assess Cyber Security Risk](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_dark71&ch=SBX&cid=_upcoming_webinars_8.500001492&_mc=_upcoming_webinars_8.500001492)Nov 12, 2024* [Securing Tomorrow, Today: How to Navigate Zero Trust](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7186&ch=SBX&cid=_upcoming_webinars_8.500001490&_mc=_upcoming_webinars_8.500001490)Nov 13, 2024* [The State of Attack Surface Management (ASM), Featuring Forrester](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7317&ch=SBX&cid=_upcoming_webinars_8.500001501&_mc=_upcoming_webinars_8.500001501)Nov 15, 2024* [Applying the Principle of Least Privilege to the Cloud](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_wiza60&ch=SBX&cid=_upcoming_webinars_8.500001499&_mc=_upcoming_webinars_8.500001499)Nov 18, 2024[More Webinars](/resources?types=Webinar) White Papers* [Insider Risk Programs: 3 Truths and a Lie](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7106&ch=SBX&cid=_whitepaper_14.500005800&_mc=_whitepaper_14.500005800)* [2024 Cloud Security Report](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_tren83&ch=SBX&cid=_whitepaper_14.500005795&_mc=_whitepaper_14.500005795)* [A CISO’s Guide to Geopolitics and CyberSecurity](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6908&ch=SBX&cid=_whitepaper_14.500005778&_mc=_whitepaper_14.500005778)* [5 Essential Insights into Generative AI for Security Leaders](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_senu26&ch=SBX&cid=_whitepaper_14.500005772&_mc=_whitepaper_14.500005772)* [How to Use Threat Intelligence to Mitigate Third-Party Risk](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_cybo172&ch=&cid=_whitepaper_14.500005744&_mc=_whitepaper_14.500005744)[More Whitepapers](/resources?types=Whitepaper)
Related Tags:
NAICS: 518 – Computing Infrastructure Providers
Data Processing
Web Hosting
Related Services
NAICS: 92 – Public Administration
NAICS: 522 – Credit Intermediation And Related Activities
NAICS: 51 – Information
NAICS: 924 – Administration Of Environmental Quality Programs
Blog: Dark Reading
Software Discovery: Security Software Discovery
Software Discovery
Associated Indicators: