Cybersecurity researchers are successful a whole bunch of hundreds of {dollars} in money and prizes within the Pwn2Own competitors, discovering beforehand unknown vulnerabilities in extensively used merchandise like Adobe Reader, Home windows 11, SharePoint, and extra.
Throughout the first day of the two-day threat-hunting competitors, the largest prize, together with $200,000 in money and a model new automotive, was awarded to a workforce referred to as “Synacktiv” that efficiently used a single integer overflow towards the Tesla ECU with Automobile CAN BUS Management, in keeping with the competitors’s sponsor, the Zero Day Initiative. That is the second time the workforce has gained for a Tesla hack, and the second Tesla 3 the group has collected, ZDI added in its announcement of the winners.
After the Tesla hack group, the second-place holder within the Pwn2Own bug bounty competitors’s first day was Manfred Paul, who collected $102,500 in bug bounties, together with $60,000 for locating Apple Safari flaws that embody an integer underflow bug in addition to a PAC bypass, ZDI stated. Paul gained an extra $42,000 for exploiting each Chrome and Edge browsers, the group added.
The highest winners moved onto a second day of Pwn2Own to compete for the highest title, “Grasp of Pwn.”