The bustling atmosphere of Berlin’s technology hub was electrified as the infamously challenging Pwn2Own hacking competition made its much-anticipated German premiere. Hailed as the Oscars of cybersecurity exploits, Pwn2Own didn’t disappoint: a staggering prize pot exceeding one million dollars...
Here’s a summary of what happened, based on your Forbes excerpt and forum highlights:
What Happened at Pwn2Own Berlin 2025?
On the first day, Windows 11 was successfully hacked three separate times by elite security researchers using zero-day exploits (vulnerabilities unknown to the vendor)...
For the global cybersecurity community, few events attract the anticipation—or the unnerving revelations—like the renowned Pwn2Own contest. Now held for the first time in Berlin under the stewardship of Trend Micro’s Zero Day Initiative (ZDI), the latest installment of Pwn2Own has delivered not...
The first day of Pwn2Own Berlin 2025 brought the cybersecurity spotlight back to some of the world’s most critical software platforms, revealing a dynamic and, at times, unsettling glimpse into the vulnerabilities that underscore the modern IT ecosystem. On this opening day alone, researchers...
The inaugural day of Pwn2Own Berlin 2025, hosted by the Zero Day Initiative (ZDI), showcased a series of groundbreaking exploits across various categories, including the debut of the Artificial Intelligence (AI) category. The event awarded a total of $260,000 to participating researchers, with...
ai vulnerabilities
berlin 2025
bug collisions
cybersecurity
cybersecurity competition
docker desktop
exploit demonstrations
exploits
linux security
operating systems security
pwn2own
research exploits
secure software
security research
security vulnerabilities
virtualization hacks
vulnerability discovery
windows 11
zero day initiative
zero-day exploits
When the doors opened on the first day of Pwn2Own Berlin 2025, few could have predicted just how quickly and decisively some of the world’s most widely used enterprise operating systems would fall to the creative might of leading security researchers. Within hours, Windows 11 and Red Hat...
Using three different vulnerabilities and clever exploitation techniques, Irish security researcher Stephen Fewer successfully hacked into a 64-bit Windows 7 (SP1) running Internet Explorer 8 to win this year’s CanSecWest hacker challenge.
More...
Link Removed due to 404 Error
Computer Security Advances don't just come from malicious attacks that are subsequently patched by software programmers. They are also the result of more genial attempts to hack into commonly used apps. Sometimes people even throw hacking competitions to see who can...
browser
cash prizes
competition
cybersecurity
exploits
firefox
google chrome
hacking
internet explorer
iphone
malicious attacks
mobile devices
nokia
pwn2own
safari
security
security design
software update
vulnerabilities
windows xp
iPhone Hacked Fast at Pwn2Own 2010
An iPhone got hacked in just 20 seconds at this week’s Pwn2Own hacking contest at CanSecWest 2010, along with Internet Explorer 8, and Apple’s Safari browser. DV Labs sponsors the annual hacking contest where if you successfully exploit a target you get to...
Link Removed
Some of you might have seen today's story by Gregg Keizer of our sister publication Computerworld headlined "Link Removed due to 404 Error" and may have asked the same question I asked.
Two minutes?
Dutch hacker Peter Vreugdenhil broke into the current edition of the Web browser...
aslr
black hat
browser
computerworld
cybersecurity
dep
exploit
hackers
hacking
internet explorer
memory protection
peter vreugdenhil
pwn2own
security
security patch
software industry
tipping point
vulnerability
white hat
windows 7
March 25, 2010
(Dutch researcher explains his strategy for outwitting Microsoft defense mechanisms to win $ 10,000)
Peter Vreugdenhil of the Netherlands bypasses DEP & ASLER to bring down Microsoft's Browser. And another German Researcher who wouldn't give his full name, called Nils found a...
aslr
cash prize
competition
cybersecurity
def-con
dep
evasion techniques
exploits
hackers conference
hacking
internet explorer
memory protection
mozilla firefox
pwn2own
research
security
software exploitation
strategies
vulnerability
windows 7