From hackread.com
These critical vulnerabilities were reported to Apple by a team of young cyber security researchers.
Bug bounty programs happen to be effective as they offer independent ethical hackers the motivation to help companies find vulnerabilities.
A recent case is a testimony to this where a team of cyber security researchers has succeeded in finding a total of 55 vulnerabilities in Apple’s networks over a course of 3 months. The names and Twitter handle of researchers participated in Apple’s bug bounty program are: