Google’s Chrome Bug Bounties: When Finding Flaws Pays More Than Your Day Job!
Google pays $73,000 to researchers for finding serious Chrome vulnerabilities. One flaw, a use-after-free issue in Serviceworker, fetched $43,000. The other, a high-severity issue in Mojo, earned $30,000. While impressive, these rewards pale in comparison to a recent $250,000 bounty. Users are advised to update Chrome to the latest version immediately.

Hot Take:
Looben Yang and company are basically the Ghostbusters of the digital world, busting bugs and cashing big checks from Google! They managed to turn the ghostly, invisible world of use-after-free memory bugs into a treasure chest with a cool $43,000 prize. Imagine getting paid major bucks just to tell Google their browser had a few too many ‘free radicals’ floating around! Meanwhile, the rest of us are still trying to figure out how to get paid for finding the TV remote.
Key Points:
- Google patched two major vulnerabilities in Chrome, one critical and one high-severity.
- Looben Yang reported the critical use-after-free flaw, earning a $43,000 bounty.
- The high-severity flaw in Mojo was reported by Sahan Fernando and another researcher, earning them $30,000.
- Both vulnerabilities are not known to have been exploited in the wild yet.
- Google recommends users update their Chrome browser immediately.