Security researchers demonstrated 28 zero-day weaknesses Pwn2own competition It was held during the offensive also in Berlin ending Saturday. Falls gave moral hackers Microsoft Windows 11, Red Hat Linux for Workstation, Mozilla Firefox, VMWARE ESXI, VMWARE WARCSTATES, Oracle VirtueBox, Microsoft Sharepoint, DOCKERT, DOCKERT, DOCKERT, DOCKERT, DOCKERT, DOCKERT, DOCKERT, DOCKERT, DOCKERT, DOCKERAT Allowed to compromise the software products used in most enterprises, including Nvidia Triton Incenance Contens TOODER TOODER TOODER TOODER TOODER TOODER TOODER TOODER TOODER TOODER TOODER TOLKIT.
The PWN2OWN competition has been running annually at security conferences for the last 18 years. This trend is conducted by Micro’s Zero Day Initiative (ZDI), a bug bounty program, through which researchers can report the weaknesses to the sellers and pay them to report. The ZDi trend uses advance knowledge of these flaws to develop safety rules for micro customers.
Researchers participating teams collected points and monetary awards for successful efforts to show their exploits against the declared goals. Overall, the competition paid $ 1,078,750, with $ 320,000 first going to Singapore -based Cyber Security Consultancy firm Star Labs SG.