{"id":43348,"date":"2021-10-11T14:22:37","date_gmt":"2021-10-11T14:22:37","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32711\/ZTE-Widens-Bug-Bounty-To-Focus-On-5G-Security.html"},"modified":"2021-10-11T14:22:37","modified_gmt":"2021-10-11T14:22:37","slug":"zte-widens-bug-bounty-to-focus-on-5g-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/","title":{"rendered":"ZTE Widens Bug Bounty To Focus On 5G Security"},"content":{"rendered":"<p>ZTE has widened a bug bounty scheme to plug security vulnerabilities in its products, especially potential holes brought about by the launch of <span class=\"link\"><a href=\"https:\/\/www.zdnet.com\/article\/what-is-5g-the-business-guide-to-next-generation-wireless-technology\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;link_anchor&quot;, &quot;pageType&quot;: &quot;article&quot;}\">commercial 5G networks and services<\/a><\/span>. The Chinese networking equipment vendor is working with bug bounty platform YesWeHack to test a range of products, including smartphones as well as cloud computing and database management systems.&nbsp;<\/p>\n<p>More than 30,000 researchers in YesWeHack&#8217;s global network have been invited to participate in the bounty, which offers up to $2,000 for each bug uncovered, with the final amount awarded depending on the severity level. When <a href=\"https:\/\/www.zdnet.com\/article\/bug-bounty-platform-urges-need-for-firms-to-have-vulnerability-disclosure-policy\/\" target=\"_blank\" rel=\"noopener\">ZDNet spoke with<\/a> its Asia-Pacific managing director Kevin Gallerin in July, the bug bounty platform worked with 10,000 security researchers in this region.&nbsp;<\/p>\n<p>In a statement Monday, YesWeHack said the deployment of <a href=\"https:\/\/www.zdnet.com\/article\/security-crucial-as-5g-connects-more-industries-devices\/\" target=\"_blank\" rel=\"noopener\">5G networks had further underscored the importance of cybersecurity<\/a> in the telecoms industry, with such rollouts increasing potential attack surfaces and introducing new technologies and techniques into the threat landscape.&nbsp;<\/p>\n<div class=\"relatedContent alignRight\" readability=\"7.3356164383562\">\n<h3 class=\"heading\"> <span class=\"int\">ZDNet Recommends<\/span> <\/h3>\n<div class=\"thumb\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-5g-phone\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\"> <span class=\"img \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/5a9c35eb050c91a4fdbad0295fda0142384d181c\/2020\/09\/01\/ac36a8a5-9a47-4af0-a075-09bdf13d0f62\/product-image-18.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\" class alt=\"Best 5G phone 2021\" height=\"165\" width=\"220\"><\/span> <\/a> <\/div>\n<p class=\"title\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-5g-phone\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\"> Best 5G phone 2021 <\/a> <\/p>\n<p class=\"dek\">5G is now standard on US networks, with the expectation that every flagship includes support for 5G.<\/p>\n<p class=\"read-more\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-5g-phone\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\">Read More<\/a> <\/p>\n<\/p><\/div>\n<p>&#8220;In addition, the ability of 5G to support massive Internet of Things (IoT) connectivity introduces many times more devices connected to the network, presenting a wide-reaching and increased attack surface,&#8221; it said.&nbsp;<\/p>\n<p>ZTE&#8217;s product portfolio spans handsets, mobile broadband, terminal chipset modules, and peripheral products. The bug bounty would enable the Shenzhen-based vendor to build a &#8220;sound cybersecurity governance structure&#8221; and &#8220;security assurance mechanism&#8221; across the entire product lifecycle, YesWeHack said. &nbsp;<\/p>\n<p>ZTE&#8217;s chief security officer Zhong Hong said in the statement: &#8220;Through openness and transparency, we try to give our customers confidence by letting them see what we do and how we provide end-to-end security. Our partnership with YesWeHack will help to enhance the security of ZTE&#8217;s products and confront new challenges brought by the 5G network commercialisation.&#8221;<\/p>\n<p>The <a href=\"https:\/\/yeswehack.com\/programs\/zte-products-bug-bounty-program\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">ZTE bug bounty<\/a> covers product categories such as the vendor&#8217;s&nbsp;<a href=\"https:\/\/www.zte.com.cn\/global\/products\/core_network\/packet_core\/202003251501\/5G-Common-Core\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">5G Common Core<\/a>&nbsp;fixed networking systems, 5G NR (New Radio) equipment, smart home and video IoT systems, and Axon and Blade smartphone series.&nbsp;<\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/zte-lashes-out-at-us-ban-vows-to-protect-company\/\" target=\"_blank\" rel=\"noopener\">ZTE<\/a> has remained on the list of telecoms equipment <a href=\"https:\/\/www.fcc.gov\/document\/fcc-designates-huawei-and-zte-national-security-threats\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">barred from being purchased using<\/a> the US Federal Communications Commission&#8217;s (FCC) Universal Service Fund, after the US government agency In November&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/zte-stays-on-fcc-national-security-threat-list\/\" target=\"_blank\" rel=\"noopener\">rejected the Chinese vendor&#8217;s request to be removed<\/a> as a national security threat.&nbsp;<\/p>\n<p>The FCC last month set out its conditions for small carriers looking to be reimbursed for <a href=\"https:\/\/www.zdnet.com\/article\/fcc-details-1-9-billion-program-to-rip-out-huawei-and-zte-gear-in-the-us\/\" target=\"_blank\" rel=\"noopener\">ripping out and replacing network equipment and services from ZTE<\/a> and Huawei. Amongst the conditions it listed for access to the designated $1.9 billion in funds, the commission said eligible expenses included the cost of removing, replacing, and disposing of ZTE and Huawei equipment and services obtained on or before June 30 last year. &nbsp;<\/p>\n<p>The reimbursement scheme had been in the works for&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/fcc-proposes-rip-and-replace-of-zte-huawei-gear-in-carriers-who-take-usf-funds-whos-paying\/\">two years<\/a>&nbsp;after the FCC&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/fcc-officially-designates-huawei-zte-as-national-security-threats\/\">officially labelled<\/a>&nbsp;the two Chinese networking equipment vendors as national security threats in July 2020.&nbsp;<\/p>\n<p>GSMA has projected Asia-Pacific to be the&nbsp;<a href=\"https:\/\/www.gsma.com\/asia-pacific\/whats-new\/gsma-asia-set-to-become-worlds-largest-5g-region-by-2025\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">world&#8217;s largest 5G region<\/a>&nbsp;by 2025, hitting 675 million connections &#8212; or more than half of the global volume. However, the industry group&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/apac-telcos-to-spend-331b-on-5g-but-4g-remains-dominant-in-some-markets\/\" target=\"_blank\" rel=\"noopener\">revised its 2020 projection<\/a>&nbsp;of 5G connections to be 20% lower than its previous forecast due to the global pandemic. &nbsp;<\/p>\n<p>It said the region&#8217;s growth would be led by markets such as China, Japan, and South Korea, with&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/apac-telcos-to-spend-331b-on-5g-but-4g-remains-dominant-in-some-markets\/\" target=\"_blank\" rel=\"noopener\">mobile operators investing $331 billion<\/a>&nbsp;in building out their 5G networks. GSMA further estimated that 24 markets across Asia-Pacific would have launched 5G by 2025, including&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/china-to-lead-apac-tech-spend-5g-race-ahead-of-global-markets\/\" target=\"_blank\" rel=\"noopener\">China<\/a>, where 28% of mobile connections would run on 5G networks and account for a third of the world&#8217;s 5G connections.&nbsp;<\/p>\n<h3><strong>Related coverage<\/strong><\/h3>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32711\/ZTE-Widens-Bug-Bounty-To-Focus-On-5G-Security.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8789],"class_list":["post-43348","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackerphone"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ZTE Widens Bug Bounty To Focus On 5G Security 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ZTE Widens Bug Bounty To Focus On 5G Security 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-11T14:22:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/5a9c35eb050c91a4fdbad0295fda0142384d181c\/2020\/09\/01\/ac36a8a5-9a47-4af0-a075-09bdf13d0f62\/product-image-18.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zte-widens-bug-bounty-to-focus-on-5g-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zte-widens-bug-bounty-to-focus-on-5g-security\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"ZTE Widens Bug Bounty To Focus On 5G Security\",\"datePublished\":\"2021-10-11T14:22:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zte-widens-bug-bounty-to-focus-on-5g-security\\\/\"},\"wordCount\":633,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zte-widens-bug-bounty-to-focus-on-5g-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5a9c35eb050c91a4fdbad0295fda0142384d181c\\\/2020\\\/09\\\/01\\\/ac36a8a5-9a47-4af0-a075-09bdf13d0f62\\\/product-image-18.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\",\"keywords\":[\"headline,hacker,phone\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zte-widens-bug-bounty-to-focus-on-5g-security\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zte-widens-bug-bounty-to-focus-on-5g-security\\\/\",\"name\":\"ZTE Widens Bug Bounty To Focus On 5G Security 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zte-widens-bug-bounty-to-focus-on-5g-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zte-widens-bug-bounty-to-focus-on-5g-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5a9c35eb050c91a4fdbad0295fda0142384d181c\\\/2020\\\/09\\\/01\\\/ac36a8a5-9a47-4af0-a075-09bdf13d0f62\\\/product-image-18.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\",\"datePublished\":\"2021-10-11T14:22:37+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zte-widens-bug-bounty-to-focus-on-5g-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zte-widens-bug-bounty-to-focus-on-5g-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zte-widens-bug-bounty-to-focus-on-5g-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5a9c35eb050c91a4fdbad0295fda0142384d181c\\\/2020\\\/09\\\/01\\\/ac36a8a5-9a47-4af0-a075-09bdf13d0f62\\\/product-image-18.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5a9c35eb050c91a4fdbad0295fda0142384d181c\\\/2020\\\/09\\\/01\\\/ac36a8a5-9a47-4af0-a075-09bdf13d0f62\\\/product-image-18.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zte-widens-bug-bounty-to-focus-on-5g-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,phone\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerphone\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ZTE Widens Bug Bounty To Focus On 5G Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ZTE Widens Bug Bounty To Focus On 5G Security 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/","og_locale":"en_US","og_type":"article","og_title":"ZTE Widens Bug Bounty To Focus On 5G Security 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-10-11T14:22:37+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/5a9c35eb050c91a4fdbad0295fda0142384d181c\/2020\/09\/01\/ac36a8a5-9a47-4af0-a075-09bdf13d0f62\/product-image-18.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"ZTE Widens Bug Bounty To Focus On 5G Security","datePublished":"2021-10-11T14:22:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/"},"wordCount":633,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5a9c35eb050c91a4fdbad0295fda0142384d181c\/2020\/09\/01\/ac36a8a5-9a47-4af0-a075-09bdf13d0f62\/product-image-18.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp","keywords":["headline,hacker,phone"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/","url":"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/","name":"ZTE Widens Bug Bounty To Focus On 5G Security 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5a9c35eb050c91a4fdbad0295fda0142384d181c\/2020\/09\/01\/ac36a8a5-9a47-4af0-a075-09bdf13d0f62\/product-image-18.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp","datePublished":"2021-10-11T14:22:37+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/5a9c35eb050c91a4fdbad0295fda0142384d181c\/2020\/09\/01\/ac36a8a5-9a47-4af0-a075-09bdf13d0f62\/product-image-18.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5a9c35eb050c91a4fdbad0295fda0142384d181c\/2020\/09\/01\/ac36a8a5-9a47-4af0-a075-09bdf13d0f62\/product-image-18.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/zte-widens-bug-bounty-to-focus-on-5g-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,phone","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerphone\/"},{"@type":"ListItem","position":3,"name":"ZTE Widens Bug Bounty To Focus On 5G Security"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43348"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43348\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}