ForensicsS | Private Detective & Digital Forensics Investigation Experts
  • info@forensicss.com

    Send Email

  • 11400 West Olympic Blvd, Los Angeles, CA 90064

  • Home
  • About Us
  • Services
    • Domestic Investigation
      • Los Angeles Private Eye
      • Infidelity Investigations
      • Asset Investigations
      • Private Detective Orange County
      • Child Custody Investigations
      • Missing Person Locates
      • Wire Fraud
      • Corporate Security Investigations
      • Surveillance Operations
      • Financial Fraud Investigations
      • Asset and Hidden Finances Investigations
      • Bug Sweep TSCM Investigation
    • Cyber Security
      • Cyber Bullying Online Investigation
      • Penetration Testing Service
      • Social Media Monitoring
      • Romance Scam Investigator
      • Cyber Stalking Investigation
      • Crypto Scam Investigation
      • Cyber Security Assessment
      • Cyber Harassment Online Investigator
      • Ransomware Attack Investigation
      • Social Media Investigator
      • Extortion Investigation services
      • Background Screening
      • Insurance Fraud Detective
      • Forensic Accounting
      • Online Identity Theft
      • Online Blackmail
      • Cell Phone Forensics
      • Automotive Forensics
      • Audio Video Forensics
      • E-Discovery
      • Computer and Cell Phone Forensics
  • Closed Cases
    • Closed Cases
    • Case Details
  • News
  • Contact
310-270-0598

Confidentiality Guaranteed

310-270-0598

Confidentiality Guaranteed

Logo

Contact Info

  • 11400 West Olympic Blvd, Los Angeles, CA 90064
  • 310-270-0598
  • info@forensicss.com

    Blog Details

      ForensicsS | Private Detective & Digital Forensics Investigation Experts > News > cybersecurity > Hackers build $1,078,750 for 28 zero-days at Pwn2Own Berlin
    Hackers build $1,078,750 for 28 zero-days at Pwn2Own Berlin
    19
    May
    • ForensicsS
    • 0 Comments

    Hackers build $1,078,750 for 28 zero-days at Pwn2Own Berlin

    Cybersecurity expert

    cybersecurity expert Pwn2Own Berlin

    The Pwn2Own Berlin 2025 hacking competition has concluded, with security researchers incomes $1,078,750 after exploiting 29 zero-day vulnerabilities and encountering some worm collisions.

    At some level of the competition, they targeted mission technologies in the AI, net browser, virtualization, local privilege escalation, servers, mission applications, cloud-native/container, and car classes.

    Per Pwn2Own’s principles, all targeted devices had all security updates installed and ran the most fresh working system variations.

    Whereas Tesla additionally equipped two 2025 Tesla Model Y and 2024 Tesla Model 3 bench-high objects, security researchers who joined the competition haven’t registered any attempts on this class sooner than Pwn2Own started.

    Competitors composed $260,000 in money awards after the principle day and but every other $435,000 on the 2nd day after exploiting 20 zero-day vulnerabilities. On the third day of Pwn2Own, they composed but every other $383,750 for eight more zero-days.

    After these vulnerabilities are demoed all the strategy by method of Pwn2Own events, distributors grasp 90 days to release security updates sooner than TrendMicro’s Zero Day Initiative publicly discloses them.

    cybersecurity expert Pwn2Own Berlin 2025 third day
    Pwn2Own Berlin 2025 final rankings (ZDI)

    ​The STAR Labs SG team won this 365 days’s version of Pwn2Own Berlin with 35 Master of Pwn aspects and $320,000 earned all the strategy by method of the three-day contest after hacking Crimson Hat Challenge Linux, Docker Desktop, Windows 11, VMware ESXi, and Oracle VirtualBox.

    STAR Labs’ Nguyen Hoang Thach won the competition’s highest reward of $150,000 after utilizing an integer overflow exploit to hack the VMware ESXi hypervisor instrument.

    Crew Viettel Cyber Security took 2nd method after demonstrating zero-day flaws that may per chance maybe let attackers get away to the host system from Oracle VirtualBox guests and hack Microsoft SharePoint utilizing an exploit chain combining an auth bypass and an haunted deserialization.

    On the third day, team Reverse Tactics all every other time hacked VMware’s hypervisor instrument utilizing an exploit chain abusing an integer overflow and an uninitialized variable worm to construct $112,500 and grab third method in the rankings.

    Mozilla has already patched the two Firefox zero-day bugs (CVE-2025-4918 and CVE-2025-4919) demoed all the strategy by method of the competition after releasing Firefox 138.0.4, Firefox ESR 128.10.1, Firefox ESR 115.23.1, and a original Firefox for Android version over the weekend to take care of them.

    In March 2024, Mozilla fastened two other zero-day vulnerabilities in the Firefox net browser (CVE-2024-29943 and CVE-2024-29944) after security researcher Manfred Paul exploited and reported them at Pwn2Own Vancouver 2024.


    cybersecurity expert Red Report 2025

    Be taught Extra

    • Tags

    • cybercrime cybercrimefraud cybercrimehacker cybersecurity email-fraud forensics|digital-forensics hacker hackers Investigation malware malwarephishing-attack online-scam private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker zero-days

    Leave a Comment Cancel Reply

    Your email address will not be published.*

    Recent Posts

    • AI products that sound too upright to be loyal will doubtless be malware in hide
    • LAWSPLAINING: Margot Cleveland Suggests That the FBI Has Systematically Violated Defendants’ Rights
    • Dan Bongino stumbled on he in actuality has to waste work at the FBI — and he does now not admire it
    • RFK Jr. Swaps Made-Up Learn in His Dispute for Extra Made-Up Learn
    • Hackers Aren’t Correct After Your Gadgets

    Recent Comments

    No comments to show.

    Categories

    • cybersecurity
    • Investigations
    • Uncategorized

    Recent Posts

    AI products that sound too upright to be loyal will doubtless be malware in hide
    May 31, 2025
    AI products that sound too upright to be loyal will doubtless be malware in hide
    LAWSPLAINING: Margot Cleveland Suggests That the FBI Has Systematically Violated Defendants’ Rights
    May 30, 2025
    LAWSPLAINING: Margot Cleveland Suggests That the FBI Has Systematically Violated Defendants’ Rights
    Dan Bongino stumbled on he in actuality has to waste work at the FBI — and he does now not admire it
    May 30, 2025
    Dan Bongino stumbled on he in actuality has to waste work at the FBI — and he does now not admire it

    Popular Tags

    administration analyst calls Chinese Commission companies Crypto Cyber cybercrime cybercrimefraud cybercrimehacker cybersecurity Department digital-forensics email-fraud Extortion Faces forensics|digital-forensics Former fraud government hacker hackers Investigation Israeli Justice Korea Korean Launches malware malwarefraud malwarephishing-attack Million North online-scam online-scamphishing-attack phishing-attack private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker regulator takes Trump

    Forensics – Trusted Experts in Surveillance, Cyber Security, Background Checks, and Digital Forensics across California.

    • 310-270-0598
    • info@forensicss.com
    • 11400 West Olympic Blvd, Los Angeles, CA 90064

    Explore

    • News
    • About
    • Our Services
    • Find A Person
    • Child Custody
    • Contact Us
    • Los Angeles
    • Orange County
    • San Diego

    Services

    • Cyber Security
    • Online Blackmail
    • Cell Phone Forensics
    • Domestic Investigation
    • Social Media Investigator
    • Crypto Scam Investigation

    Newsletter

    Sign up email to get our daily latest news & updates from us

    © Copyright 2021 by KRIGO