Lee Dong-geun, the Deputy Minister of Korea Internet & Security Agency (KISA) (on the left), and Choi Jin-wook, the Chief Information Security Officer of Kakao Mobility, are taking photos after the signing ceremony for a business agreement at the Kakao Mobility headquarters in Seongnam, Gyeonggi Province, on the 5th. /Courtesy of Kakao Mobility

Kakao Mobility announced on the 6th that it will participate as a joint operator of the 'New Security Vulnerability Reporting Reward System' established by the Korea Internet & Security Agency (KISA).

The two companies signed a memorandum of understanding to participate as joint operators of the 'New Security Vulnerability Reporting Reward System' at Kakao Mobility's headquarters in Seongnam, Gyeonggi Province, on the 5th.

This is part of KISA's 'Bug Bounty' joint operation system, which supports corporations in identifying security vulnerabilities and proactive responses. Bug bounty is a reward system that provides monetary rewards or incentives to white hat hackers and others who discover and report new security vulnerabilities in software or web services.

Through this agreement, Kakao Mobility plans to expand the participation of external security experts to proactively identify security vulnerabilities in the Kakao T and Kakao Navi apps and web services, and establish a system to improve them safely.

In particular, it is expected to effectively prepare for increasingly sophisticated and intelligent hacking threats, such as large language model (LLM) based hacking attacks using artificial intelligence (AI), automated hacking tools, and APT attacks (advanced persistent threats), while enhancing service security levels.

The 'New Security Vulnerability Reporting Reward System' is open for participation to any Korean residing domestically or abroad who is interested in the field of security.

Choi Jin-wook, Chief Information Security Officer (CISO) of Kakao Mobility, said, "Through this agreement, we expect to identify security vulnerabilities early and prevent damages, including the leakage of personal information or sensitive corporate information, enabling practical and comprehensive responses to hacking threats."

※ This article has been translated by AI. Share your feedback here.