Cybersecurity researchers are successful a whole bunch of 1000’s of {dollars} in money and prizes within the Pwn2Own competitors, discovering beforehand unknown vulnerabilities in broadly used merchandise like Adobe Reader, Home windows 11, SharePoint, and extra.
Through the first day of the two-day threat-hunting competitors, the most important prize, together with $200,000 in money and a model new automotive, was awarded to a group known as “Synacktiv” that efficiently used a single integer overflow towards the Tesla ECU with Car CAN BUS Management, based on the competitors’s sponsor, the Zero Day Initiative. That is the second time the group has received for a Tesla hack, and the second Tesla 3 the group has collected, ZDI added in its announcement of the winners.
After the Tesla hack group, the second-place holder within the Pwn2Own bug bounty competitors’s first day was Manfred Paul, who collected $102,500 in bug bounties, together with $60,000 for locating Apple Safari flaws that embody an integer underflow bug in addition to a PAC bypass, ZDI stated. Paul received a further $42,000 for exploiting each Chrome and Edge browsers, the group added.
The highest winners moved onto a second day of Pwn2Own to compete for the highest title, “Grasp of Pwn.”