Aggregator
前沿 | 人工智能治理国际合作的中国主张
聚焦 | 蓝莲花战队十五周年论坛在京举行 共话网安极客之路
我们“红”了!信息安全媒体国家队,持证亮牌!
Они не знают друг друга, но уже договорились — ИИ начал создавать собственное общество
CVE-2008-6927 | cPanel autoinstall4imagesgalleryupgrade.php cross site scripting (EDB-6897 / XFDB-46253)
Pwn2Own Berlin 2025: Day One Results
Welcome to the first day of Pwn2Own Berlin 2025! We have 11 different attempts, including our first ever AI attempts. We’ll be updating this blog with results as we have them.
And that bring Day One of #Pwn2Own Berlin to a close. We awarded $260,000 today, but more great research is yet to come. STAR Labs has an early lead on Master of Pwn, but it's anyone's game at this point. Stay tuned for more results as we go.
SUCCESS - Pumpkin (@u1f383) from DEVCORE Research Team used an integer overflow to escalate privs on Red Hat Linux. He earns $20,000 and 2 Master of Pwn points.
Going from user land to root.
COLLISION - We have a bug collision. Although Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) successfully demonstrated his exploit of #NVIDIA Triton, the bug he used was known by the vendor (but not patched). He still earns $15K and 1.5 Master of Pwn points.
SUCCESS - Chen Le Qi (@cplearns2h4ck) of STARLabs SG combined a UAF and an integer overflow to escalate to SYSTEM on #Windows 11. He earns $30,000 and 3 Master of Pwn points.
FAILURE - Unfortunately, the team from Wiz Research could not get their exploit of the NVIDIA Triton Inference working within the time allotted.
COLLISION - Hyunwoo Kim (@V4bel) and Wongi Lee (@_qwerty_po) of Theori were able to escalate to root on Red Hat Linux with an info leak and a UAF, but one of the bugs used was an N-day. They still win $15,000 and 1.5 Master of Pwn points.
SUCCESS - The first ever winner of the AI category in Pwn2Own history is Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam). His successful exploitation of Chroma earns him $20,000 and 2 Master of Pwn points.
SUCCESS - In a surprise to no one, Marcin Wiązowski's privilege escalation on Windows 11 is confirmed! He used an Out-of-Bounds Write to escalate to SYSTEM. His work earns him $30,000 and 3 Master of Pwn points.
SUCCESS - Their enthusiasm was rewarded as Team Prison Break (Best of the Best 13th) used an integer overflow to escape Oracle VirtualBox and execute code on the underlying OS. They earn $40,000 and 4 Master of Pwn points.
COLLISION - We have another collision - Viettel Cyber Security (@vcslab) targeting NVIDIA Triton Inference Server successfully demonstrated their exploit - however it was known to the vendor, but not yet patched. They still earn $15000 and 1.5 Master of Pwn Points
SUCCESS - Hyeonjin Choi (@d4m0n_8) of Out Of Bounds earns $15,000 for a third round win and 3 Master of Pwn Points by successfully using a type confusion bug to escalate privileges in #Windows11 #Pwn2Own #P2OBerlin
SUCCESS - Nicely done! Billy and Ramdhan of STAR Labs used a UAF to perform their Docker Desktop escape and execute code on the underlying OS. They earn $60,000 and 6 Master of Pwn Points.
PyPI 恶意包攻击 Solana 开发人员
分支特权注入攻击影响英特尔所有CPU
ANY.RUN Becomes a Gold Winner in Threat Intelligence at Globee Awards 2025
We are honored to announce that ANY.RUN became a gold winner at the annual Globee Business Awards 2025. The award aims to recognize and celebrate excellence in various industries worldwide, including cybersecurity. Our solution, ANY.RUN’s TI Lookup, was named best in the Cyber Threat Intelligence category. We believe that threat intelligence is an essential aspect […]
The post ANY.RUN Becomes a Gold Winner in Threat Intelligence at Globee Awards 2025 appeared first on ANY.RUN's Cybersecurity Blog.
CVE-2025-4467 | SourceCodester Online Student Clearance System 1.0 /admin/edit-admin.php id/txtfullname/txtemail/cmddesignation sql injection (EUVD-2025-14158)
CVE-2025-4579 | WP Content Security Plugin Plugin up to 2.3 on WordPress CSP-Report Field cross site scripting (EUVD-2025-14943)
Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers
7天打造 IDA 9.0 大师:从零基础到逆向精英
触目惊心!“新币担保”涉84亿美元加密犯罪,杀猪盘、人口贩卖、洗钱全打通
firmadyne源码解析-揭开固件模拟的黑盒面纱
Dior взломали. Клиенты модного дома — теперь мишень для фишинга и кражи личности
Meer vormen van spionage strafbaar
CyberStrong May Product Update
The team at CyberSaint is thrilled to announce the latest additions and updates to the CyberStrong solution. To start, we’ve expanded Continuous Control Automation to help our clients streamline adoption and configuration, helping you assess your cyber risk data faster than ever before. We’ve also added updates to editing reports and an important update to tracking risk trends on the Executive Dashboard.
The post CyberStrong May Product Update appeared first on Security Boulevard.