April 15, 2024

Cybersecurity researchers are successful lots of of hundreds of {dollars} in money and prizes within the Pwn2Own competitors, discovering beforehand unknown vulnerabilities in broadly used merchandise like Adobe Reader, Home windows 11, SharePoint, and extra.

Throughout the first day of the two-day threat-hunting competitors, the most important prize, together with $200,000 in money and a model new automotive, was awarded to a crew known as “Synacktiv” that efficiently used a single integer overflow in opposition to the Tesla ECU with Automobile CAN BUS Management, in line with the competitors’s sponsor, the Zero Day Initiative. That is the second time the crew has received for a Tesla hack, and the second Tesla 3 the group has collected, ZDI added in its announcement of the winners.

After the Tesla hack group, the second-place holder within the Pwn2Own bug bounty competitors’s first day was Manfred Paul, who collected $102,500 in bug bounties, together with $60,000 for locating Apple Safari flaws that embody an integer underflow bug in addition to a PAC bypass, ZDI said. Paul received an extra $42,000 for exploiting each Chrome and Edge browsers, the group added.

The highest winners moved onto a second day of Pwn2Own to compete for the highest title, “Grasp of Pwn.”