Go back

December 12, 2024 (Los Angeles, CA) – CUJO AI, the leader in AI-powered cybersecurity and network intelligence for Network Service Providers (NSPs) is launching its Bug Bounty Program to reward security researchers for disclosing any security vulnerabilities related to its services, products, including firmware, and the cujo.com website. 

The program is designed to strengthen collaboration with the global community of ethical hackers and security researchers, inviting them to identify and report vulnerabilities that could impact CUJO AI’s offerings. 

With a clear submission process and detailed guidelines, the Bug Bounty Program underscores CUJO AI’s dedication to transparency, innovation, and the continuous enhancement of its cybersecurity solutions. By leveraging the insights of external security experts, CUJO AI aims to bolster the safety and trust of its products and services, reaffirming its commitment to delivering cutting-edge protection for network service providers and their customers. 

“We are excited to launch our Bug Bounty Program, inviting the global security community to help us identify and fix vulnerabilities. As the leaders in telco customer home security, this initiative underscores our commitment to transparency, collaboration, and continuous improvement in safeguarding our users’ data and our systems. Together, we can build a more secure digital future,” said Santeri Kangas, CTO at CUJO AI. 

CUJO AI has long embraced the principles of ethical hacking and fostering a culture of innovation and collaboration within its Security Research Labs, as well as extending its commitment to initiatives like the IoT Village. As an active member of the Cyber Threat Alliance, the company recognizes the indispensable role independent security researchers play in strengthening the global cybersecurity ecosystem. The launch of the Bug Bounty Program underscores CUJO AI’s dedication to improving its offerings through transparent and proactive engagement with the broader security community. 

CUJO AI asks researchers to carefully read the terms and guidelines for the submission process before submitting a vulnerability report to ensure that it is received properly and that the company uses the preferred way of acknowledging and communicating to the reporter. The terms of the program, vulnerability submission forms, bounty payment sizes, and other relevant information is published on the dedicated page.

Questions? Media inquiries? Get in touch with us at [email protected]