Wednesday , April 2 2025
Pwn2Own

Pwn2Own Contest Tokyo
Hackers Unearths Dozens of Zero-Day Vulnerabilities

Top ethical hackers are currently competing in Tokyo. They have discovered nearly 40 zero-day vulnerabilities in Tesla and other products.

The first car-focused Zero Day Initiative (ZDI) Pwn2Own contest takes place from January 24-26. ZDI is the world’s largest bug bounty program, encouraging ethical hackers to find and report vulnerabilities in products and improve digital safety.

Check Point said BreachForum post old data

Israeli cybersecurity firm Check Point has responded to a hacker who claimed to have stolen valuable information from its systems....
Read More
Check Point said BreachForum post old data

Apple Warns of 3 Zero Day Vulns Actively Exploited

Apple has issued an urgent security advisory about 3 critical zero-day vulnerabilities—CVE-2025-24200, CVE-2025-24201, and CVE-2025-24085—that are being actively exploited in...
Read More
Apple Warns of 3 Zero Day Vulns Actively Exploited

24,000 unique IP attempted to access Palo Alto GlobalProtect portals

GreyNoise has detected a sharp increase in login scanning aimed at Palo Alto Networks PAN-OS GlobalProtect portals. In the past...
Read More
24,000 unique IP attempted to access Palo Alto GlobalProtect portals

CVE-2025-1268
Patch urgently! Canon Fixes Critical Printer Driver Flaw

Canon has announced a critical security vulnerability, CVE-2025-1268, in printer drivers for its production printers, multifunction printers, and laser printers....
Read More
CVE-2025-1268  Patch urgently! Canon Fixes Critical Printer Driver Flaw

Within Minute, RamiGPT To Escalate Privilege Gaining Root Access

RamiGPT is an AI security tool that targets root accounts. Using PwnTools and OpwnAI, it quickly navigated privilege escalation scenarios...
Read More
Within Minute, RamiGPT To Escalate Privilege Gaining Root Access

Australian fintech database exposed in 27000 records

Cybersecurity researcher Jeremiah Fowler recently revealed a sensitive data exposure involving the Australian fintech company Vroom by YouX, previously known...
Read More
Australian fintech database exposed in 27000 records

Over 200 Million Info Leaked Online Allegedly Belonging to X

Safety Detectives' Cybersecurity Team found a forum post where a threat actor shared a .CSV file with over 200 million...
Read More
Over 200 Million Info Leaked Online Allegedly Belonging to X

FBI investigating cyberattack at Oracle, Bloomberg News reports

The Federal Bureau of Investigation (FBI) is probing the cyberattack at Oracle (ORCL.N), opens new tab that has led to...
Read More
FBI investigating cyberattack at Oracle, Bloomberg News reports

OpenAI Offering $100K Bounties for Critical Vulns

OpenAI has increased its maximum bug bounty payout to $100,000, up from $20,000, to encourage the discovery of critical vulnerabilities...
Read More
OpenAI Offering $100K Bounties for Critical Vulns

Splunk Alert User RCE and Data Leak Vulns

Splunk has released a security advisory about critical vulnerabilities in Splunk Enterprise and Splunk Cloud Platform. These issues could lead...
Read More
Splunk Alert User RCE and Data Leak Vulns

It was a big day for security discoveries with 24 zero-day exploits found. The French Synacktiv Team earned $100,000 for finding a three-bug chain against the Tesla Modem, $60,000 for a two-bug chain against the Ubiquiti Connect EV Station, and another $60,000 for a two-bug chain against the JuiceBox 40 Smart EV Charging Station.

The UK’s NCC Group earned $30,000 for finding a security issue with the Phoenix Contact CHARX SEC-3100 charging controller, and $40,000 for identifying three bugs in the Pioneer DMH-WT7600NEX digital receiver.

At the time of writing, a further 15 zero-day vulnerabilities had been discovered and demonstrated in exploits on day two of the competition.

Synacktiv successfully found and exploited two security vulnerabilities in the Tesla Infotainment System, earning $100,000. They also discovered and exploited three vulnerabilities in Automotive Grade Linux, resulting in a $35,000 reward.

NCC Group used two bugs to hack the Alpine Halo9 iLX-F509 media receiver and won $20,000.

The total prize money given out so far is over $1m. Vendors have 90 days to fix the vulnerabilities found in the competition before ZDI discloses them publicly.

In 2022, the Trend Micro initiative warned that customers were at risk due to poor vendor patching and confusing advisories. This made it difficult for network defenders to accurately assess their risk exposure and increased the possibility of faulty or incomplete patches.

The disclosure policy of the company was changed from 120 days to a range of 90 to 30 days, depending on the level of importance.

Pwn2Own Automotive concludes tomorrow.

Check Also

million

Oracle refutes breach after hacker claims 6 million data theft

A hacker known as “rose87168” claims to have stolen six million records from Oracle Cloud …

Leave a Reply

Your email address will not be published. Required fields are marked *