Fact-checked by Grok 2 weeks ago
References
-
[1]
Pwn2Own Hacking Competition 2025 Review | Trend Micro (US)Jan 22, 2025 · More than just a competition, Pwn2Own is a proving ground for innovation and a powerful reminder of the high stakes in security.
-
[2]
Pwn2Own Vancouver 2019: Tesla, VMware, Microsoft, and MoreJan 14, 2019 · Starting in 2007, Pwn2Own has evolved from a small demonstration with prizes averaging around $10,000 per exploit, to one of the most ...
-
[3]
Announcing Pwn2Own Berlin and Introducing an AI CategoryFeb 24, 2025 · We are happy to announce that the enterprise-focused Pwn2Own event will take place on May 15-17, 2025, at the OffensiveCon conference in Berlin, Germany.
- [4]
-
[5]
Pwn2Own Automotive 2025 - VicOneThe world's largest zero-day vulnerability discovery contest focused on connected cars and software-defined vehicles (SDVs).
- [6]
-
[7]
Pwn2Own Berlin 2025: Trend's AI Capabilities Featured - Trend MicroMay 13, 2025 · Trend Micro's Pwn2Own Berlin 2025 is breaking new ground, focusing on AI infrastructure and finding the bugs to proactively safeguard the future of computing.<|control11|><|separator|>
-
[8]
How Pwn2Own Made Bug Hunting a Real Sport - Dark ReadingMay 18, 2022 · In April 2007, when Apple's “I'm a Mac” ads were telling people that Macs can't get hacked, security researcher Dragos Ruiu decided to put ...
-
[9]
CanSecWest Founder Dragos Ruiu Talks Pwn2Own, Hacker CultureMar 8, 2013 · CanSecWest organizer and security industry “dinosaur” Dragos Ruiu explains why Pwn2Own was created and shares his thoughts on the evolution of ...
-
[10]
Hacking Competition Pwn2Own Tries to Break Into a TeslaMay 20, 2022 · Originally created by cybersecurity researcher Dragos Ruiu in 2007 as a challenge to hack into MacBook Pros, the contest is now held multiple ...<|separator|>
-
[11]
pwn2own day one: Safari, IE8 fall, Chrome unchallengedMar 9, 2011 · The days of overnight hacks may be behind us—at the first pwn2own in 2007, an exploitable Safari flaw was discovered in five hours and a ...
-
[12]
Gone in 2 minutes: Mac gets hacked first in contest - InfoWorldMar 27, 2008 · CanSecWest's PWN 2 OWN contest was won in 2 minutes -- after the rules were relaxed a bit -- as Charlie Miller hacked a MacBook Air.
-
[13]
Mac is the first to fall in Pwn2Own hack contest - The RegisterMar 28, 2008 · Winners were eligible for a $20,000 prize. On day two, the attack surface was expanded to include browsers, mail applications and other ...Missing: results | Show results with:results
-
[14]
The Battle for the [Browser] Your PC - MicrosoftApr 28, 2008 · The battle for the browser was thrust into the limelight (again) this year by Shane Macaulay at CanSecWest when on Day 3 of the pwn2own ... 2008 ...<|separator|>
-
[15]
Pwn2Own 2009: Nils takes down IE8, Firefox and Safari | AppleMar 19, 2009 · A German computer science student has hacked the three main browsers, winning $15,000, showing that none of them is completely safe.Missing: summary | Show results with:summary
-
[16]
Pwn2Own 2009: Mac falls in seconds | Apple | The GuardianMar 18, 2009 · In the annual Pwn2Own at the CanSecWest security conference in Vancouver, fully patched machines are set up, and you can win one by being first ...Missing: summary | Show results with:summary
-
[17]
Web browsers and iPhone hacked at contest - Phys.orgMar 26, 2010 · The Pwn2Own contest is an annual event that encourages security specialists to win hardware by successfully attacking it. Hackers register the ...
-
[18]
[PDF] SpiKeyAug 25, 2020 · Pwn2Own continued to grow as well. 2010 saw Pwn2Own's first successful mobile device exploit, demonstrated by Ralf-Philipp Weinmann and ...
-
[19]
Security Lessons Learned from Pwn2Own Contest | PCWorldMar 25, 2010 · The Pwn2Own contest demonstrates that dedicated attackers can compromise any platform.<|separator|>
-
[20]
Samsung Galaxy, Apple iOS Fall in Pwn2Own Hacking ContestNov 13, 2013 · Hewlett-Packard's Zero Day Initiative (ZDI) is hosting its first mobile Pwn2Own hacking competition in Japan this week, and both the Google ...
-
[21]
Announcing Pwn2Own Tokyo for 2018 - Zero Day InitiativeSep 4, 2018 · Pwn2Own Tokyo will take place on November 13 – 14 during the PacSec conference, which is held at the Aoyama St. Grace Cathedral in Tokyo, Japan.<|separator|>
-
[22]
Master of Pwn – Darknet Diaries[MUSIC] Since 2007, the Pwn2Own contest has been going on every year at CanSecWest. DUSTIN: Yes, from that point it became an annual thing and it grew. ...Missing: details | Show results with:details
-
[23]
Pwn2Own Austin 2021: Phones, Printers, NAS, and more!Aug 12, 2021 · ... expanding the router category and implementing the printer category. In all, we'll have 22 devices available as targets and be offering more ...
-
[24]
Announcing Pwn2Own Toronto 2022 and Introducing the SOHO ...Aug 29, 2022 · We wanted to demonstrate this during the contest, so we're introducing the SOHO Smashup category to show how this could happen. Contestants will ...
-
[25]
Pwn2Own Automotive Returns to Tokyo with Expanded Chargers ...Oct 16, 2025 · This year, we're introducing a new supercharger category and Alpitronic has joined as a partner and provided their Level 3 charger as a target.
-
[26]
Hackers earn over $1 million for 58 zero-days at Pwn2Own TorontoOct 27, 2023 · In March, during the Pwn2Own Vancouver 2023 competition, competitors won $1,035,000 and a Tesla Model 3 car for 27 zero-day (and several bug ...Missing: innovations | Show results with:innovations
-
[27]
Pwn2Own Vancouver 2023 awarded $1,035,000 for 27 0-daysMar 25, 2023 · On the third day of the Pwn2Own Vancouver 2023 hacking contest, the organization awarded $185,000 for 10 zero-day exploits.Missing: events innovations
-
[28]
Hackers Earn Over $1 Million at Pwn2Own Toronto 2023Oct 30, 2023 · Hackers have demonstrated 58 zero-days and earned more than $1 million in rewards at Pwn2Own Toronto 2023.
-
[29]
Samsung Galaxy S23 hacked two more times at Pwn2Own TorontoOct 25, 2023 · Security researchers hacked the Samsung Galaxy S23 smartphone two more times on the second day of the Pwn2Own 2023 hacking competition in Toronto, Canada.
-
[30]
Pwn2Own Automotive 2024: VicOne and ZDI Lead First Hackathon ...Jan 31, 2024 · The event was dedicated to discovering and fixing digital security vulnerabilities of connected cars to protect the cybersecurity of vehicles.<|separator|>
-
[31]
Tesla, OS, Software Exploits Earn Hackers $1.1 Million at Pwn2Own ...Mar 22, 2024 · Exploits targeting Tesla cars, operating systems, and popular software earned participants over $1.1 million at Pwn2Own Vancouver 2024.
-
[32]
Over $1 Million Paid Out at Pwn2Own Ireland 2024 - SecurityWeekOct 25, 2024 · Pwn2Own Ireland 2024 participants have earned over $1 million for camera, printer, NAS device, smart speaker and smartphone exploits.
-
[33]
Researchers Discover Over 70 Zero-Day Bugs at Pwn2Own IrelandOct 28, 2024 · Trend Micro's Zero Day Initiative hands out over $1m in awards for Pwn2Own competitors, who found more than 70 zero-day flaws.Missing: innovations | Show results with:innovations
-
[34]
Pwn2Own Ireland 2024: Day Two ResultsOct 23, 2024 · That's a wrap on Day 2 of Pwn2Own Ireland! Today, we awarded $358,625 - which brings the event total to $874,875. The Viettel Cyber Security ...
-
[35]
Hackers Earn Over $1 Million at Pwn2Own Berlin 2025 - SecurityWeekMay 19, 2025 · This was the first Pwn2Own to include the AI category. The biggest single reward, $150,000, went to the STAR Labs SG team for the first ...
-
[36]
Pwn2Own Automotive 2025: New Master of Pwn Crowned ... - VicOneJan 24, 2025 · 49 zero-day vulnerabilities were found, Sina Kheirkhah was crowned Master of Pwn, and Evan Grant exploited Kenwood DMX958XR. Day three included ...
- [37]
-
[38]
Pwn2Own Ireland 2025 Rules - Zero Day InitiativeTHE PWN2OWNTM CONTEST ("CONTEST") IS CONDUCTED SOLELY IN ACCORDANCE WITH AND SHALL BE CONSTRUED AND EVALUATED ACCORDING TO APPLICABLE LAW.
-
[39]
1. eligibility. - Zero Day InitiativeThe contestant can register for the contest by contacting Sponsor via e-mail at pwn2own@trendmicro.com and indicating in which categories the contestant wishes ...
-
[40]
Rev Up for Pwn2Own Automotive 2025: Here Are the Contest Rules ...Sep 25, 2024 · Points are earned for successful exploit attempts, with the first demonstration in each category winning the cash prize. Since the order of ...
-
[41]
Pwn2Own Ireland 2025 Offers $1 Million Reward For WhatsApp ...Aug 2, 2025 · Expanded Contest Categories Set for October 21–24, 2025 in Cork, Ireland, Pwn2Own will feature eight distinct categories. In addition to ...
-
[42]
Pwn2Own Automotive 2026 Offers $3M+ in Prizes for Security ...Pwn2Own Automotive 2026 unveils a $3M+ prize pool for identifying security flaws in automotive tech. Tags: Pwn2Own, automotive security.
-
[43]
Chrome, Firefox, Safari and IE – All Browsers Hacked at Pwn2Own ...Mar 22, 2015 · Chrome, Firefox, Safari and IE – All Major Browsers Hacked at Pwn2Own Hacking Competition and hacker earns $225000.
-
[44]
All four major browsers take a stomping at Pwn2Own hacking ...Mar 20, 2015 · In all, this year's Pwn2Own unearthed five bugs in Windows, four bugs in IE 11, three bugs in Mozilla Firefox, three bugs in Reader, three bugs ...Missing: high- | Show results with:high-
-
[45]
Researchers Awarded $552,500 at Pwn2Own 2015 - SecurityWeekMar 20, 2015 · He hacked Chrome (both the stable and beta versions), Internet Explorer, and Safari. The Chrome attack earned him a total of $110,000, which is ...
-
[46]
Gone in 2 Minutes: Mac Gets Hacked First in ContestMar 28, 2008 · She expects both systems to be hacked on Friday, when contest rules will be further eased, and hackers will be able to attack popular third- ...
-
[47]
Windows 11 and Red Hat Linux hacked on first day of Pwn2OwnMay 15, 2025 · Windows 11 was hacked twice more to gain SYSTEM privileges by Marcin Wiązowski, who exploited an out-of-bounds write vulnerability, and Hyeonjin ...
-
[48]
Red Hat: Hacked at Pwn2Own Berlin Important Exploit 2025May 16, 2025 · Red Hat Enterprise Linux got hacked during the Pwn2Own Berlin 2025 competition. Let that sink in for a moment. This is one of the go-to systems for businesses.Missing: notable | Show results with:notable
-
[49]
Hacks at Pwn2Own Vancouver 2023 - Schneier on SecurityMar 27, 2023 · They also used a TOCTOU zero-day vulnerability to escalate privileges on Apple macOS and earned $40,000. Oracle VirtualBox was hacked using an ...
-
[50]
Windows, macOS, and Tesla exploits debuted at Pwn2Own hacking ...Mar 23, 2023 · Researchers took home more than $375000 in winnings on the first day of the competition.
-
[51]
Streaming vulnerabilities from Windows Kernel - Part IAug 23, 2024 · Last year, MSKSSRV (Microsoft Kernel Streaming Service) became a popular target for hackers. ... Microsoft Windows 11 during Pwn2Own ...
-
[52]
CVE-2025-4919: Corruption via Math Space in Mozilla FirefoxJul 15, 2025 · At Pwn2Own Berlin 2025, Manfred Paul compromised the Mozilla Firefox renderer process using a vulnerability in IonMonkey but did not further ...
-
[53]
Over $1 Million Offered at New Pwn2Own Automotive Hacking ContestSep 1, 2023 · The first Pwn2Own Automotive will have four categories, namely Tesla, in-vehicle infotainment (IVI), electric vehicle chargers, and operating ...Missing: records specialized
-
[54]
Pwn2Own Automotive 2025 Ends with 49 New Zero-Days - Hackster.ioThe cash-for-vulnerabilities competition's automotive spin-off hands out nearly $900000 in prizes to this year's entrants.
-
[55]
Pwn2Own Miami: Hackers earn $400,000 by cracking ICS platformsApr 22, 2022 · Other researchers and bug bounty hunters successfully demonstrated previously unknown zero-day vulnerabilities in industrial control platforms ...
-
[56]
These hackers showed just how easy it is to target critical infrastructureApr 21, 2022 · In 2012, he hacked a brand-new iPhone and took home $30,000 while on center stage at Pwn2Own, the biggest hacking contest in the world.
-
[57]
[PDF] SysPWN – VR for Pwn2Own - NCC GroupYearly vulnerability research competition held by Trend Micro (ZDI - Zero Day Initiative). • Pwn2Own Mobile (October/November). • Pwn2Own Desktop (March).
-
[58]
Disclosure Policy - Zero Day InitiativeThis policy outlines how the Zero Day Initiative (ZDI) handles responsible vulnerability disclosure to product vendors, Trend Micro customers, security vendors ...
-
[59]
CVE-2024-2887: A Pwn2Own Winning Bug in Google ChromeMay 2, 2024 · This bug was quickly patched by both Google and Microsoft. Manfred has graciously provided this detailed write-up of the vulnerability and how ...
-
[60]
VMware and Pwn2Own 2025 - BerlinMay 20, 2025 · Pwn2Own 2025 has been wrapped-up and we have witnessed successful exploitation of some of the very well-known products.
-
[61]
VMware Flaws That Earned Hackers $340,000 at Pwn2Own PatchedJul 17, 2025 · Four vulnerabilities disclosed at the Pwn2Own Berlin 2025 hacking competition have been patched in VMware products.Missing: famous | Show results with:famous
-
[62]
Pwn2own — Latest News, Reports & Analysis | The Hacker NewsChrome, Firefox, Safari and IE – All Browsers Hacked at Pwn2Own Competition. Mar 22, 2015. The Annual Pwn2Own Hacking Competition 2015 held in Vancouver is ...<|separator|>
-
[63]
Chrome Update Patches Zero-Day Vulnerabilities Exploited at ...Mar 27, 2024 · Google ships a security-themed Chrome browser refresh to fix flaws exploited at the CanSecWest Pwn2Own hacking contest.
-
[64]
Competing in Pwn2Own 2021 Austin: Icarus at the ZenithMar 26, 2022 · At least, that's what we thought was the path of least resistance. ... Vendor patching bugs at the last minute can be stressful and is ...
-
[65]
A 3-Year Tale of Hacking a Pwn2Own Target: The Attacks, Vendor ...As the first team to successfully hack it, we will share our experiences, stories, and insights throughout our past 3-year research journey.
- [66]
-
[67]
Zero Day Initiative seeing an increase in failed patches - TechTargetAug 16, 2022 · And when we go to the vendor, if there's a disagreement, we have a vested interest in ensuring that those bugs are actually patched and released ...
-
[68]
Charlie Miller skipping Pwn2Own as new rules change hacking ...Due to our disagreement about the best way to get the most vulnerabilities fixed, Google has withdrawn sponsorship of Pwn2Own. We understand their reasons for ...
- [69]
-
[70]
China's security researchers stopped from attending Pwn2OwnMar 8, 2018 · The Chinese government has taken steps to discourage its country's security researchers from sharing their knowledge at some foreign cybersecurity events.
-
[71]
China discourages its hackers from foreign competitions so they don ...Mar 21, 2018 · China is discouraging its internet security experts from taking part in international hacking competitions because of national security concerns.
-
[72]
China's Vulnerability Research: What's Different Now?Oct 8, 2025 · Modeled on Pwn2Own, it brings together top domestic security researchers to demonstrate zero-day exploits against widely used software and ...
-
[73]
China Targets US With Hacking Contests - NewsweekJun 20, 2024 · At the Pwn2Own competition, Chinese teams' winnings increased from 13 per cent in 2014 to 79 per cent by 2017. Realising the strategic value, ...<|control11|><|separator|>
-
[74]
When China hoards its hackers everyone loses - EngadgetMar 16, 2018 · But this year, according to Pwn2Own manager Brian Gorenc, China is no longer allowing its researchers to compete. Prior to the start of Pwn2Own ...
-
[75]
Focus Changes To Kernel Exploits As Browsers Get Harder To HackMar 16, 2018 · This year's Pwn2Own competition was less intense, as many Chinese security teams were banned from participating. However, as browsers ...
-
[76]
Chinese Hacking Competitions Fuel the Country's Broad Cyber ...Apr 30, 2025 · Participants are required to turn findings over to the Chinese government.
-
[77]
From World Champions to State Assets: The Outsized Impact of a ...Sep 3, 2024 · By 2018, the Chinese government had barred vulnerability researchers from competing in international hacking events such as Pwn2Own. As a ...
-
[78]
Pwn2Own Tokyo hacking contest trashed, export rules blamedSep 3, 2015 · The first bona fide casualty of the Wassenaar changes: HP won't be doing PWN2OWN Mobile in Japan due to new export restrictions. But ...<|separator|>
-
[79]
Full article: The regimes of ethical hacking: moral projects and the ...This article examines the historical evolution of ethical hacking and vulnerability disclosure practices from the 1990s to the present day.<|separator|>
-
[80]
Handling Vulnerabilities: Full Disclosure vs. Responsible DisclosureAug 16, 2018 · “Full disclosure” involves the immediate publication of a vulnerability without any delay for any reason.
-
[81]
Responsible vulnerability disclosure in 2025: Why the debate still ...Oct 8, 2025 · The argument for immediate disclosure is that it forces slow-moving vendors to act fast. Once the exploit has been published, they have to patch ...
-
[82]
How China's Cyber Ecosystem Feeds Off Its Superstar HackersJun 14, 2024 · Chinese researchers were banned from attending hacking competitions held outside the country, and in 2018 an equivalent domestic event, the ...
- [83]
-
[84]
Zero Day Initiative: HomeOur goal is to encourage the reporting of zero day vulnerabilities responsibly to the affected vendors.About ZDI · Published Advisories · Program Benefits · Upcoming Advisories
- [85]
- [86]
-
[87]
Firefox Security Response to pwn2own 2025 - The Mozilla BlogMay 17, 2025 · Pwn2Own is an annual computer hacking contest where participants aim to find security vulnerabilities in major software such as browsers. This ...
-
[88]
Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100 ...May 19, 2025 · Mozilla patched 2 Firefox zero-days exploited at Pwn2Own Berlin, risking code execution via JavaScript flaws.
-
[89]
Lesson From Pwn2Own: Focus On Exploitability - Dark ReadingTalented programmers can create attack code quickly, suggesting that firms need to focus on patching easily exploitable -- not just exploited -- flaws.
- [90]
-
[91]
Trend Micro's Zero Day Initiative Celebrates 20 Years of Industry ...Aug 7, 2025 · The now-famous Pwn2Own competition followed in 2007, offering teams of researchers an opportunity to go head-to-head against each other and the ...
-
[92]
Demystifying The Market For Zero-Day Software Exploits - PacketlabsMay 17, 2024 · Pwn2Own is sponsored by Zero Day Initiative (ZDI) to acquire zero-days, then reports them to the companies affected with the goal of getting ...
-
[93]
RondoDox: From Pwn2Own Vulnerabilities to Global ExploitationOct 14, 2025 · Weaponizing known vulnerabilities for botnet expansion · A stealthy botnet built to infect everything · The exploit shotgun approach · The ...Missing: resolutions | Show results with:resolutions
-
[94]
I remember reading somewhere that hardcore foreign teams ...Dec 11, 2022 · You probably won't see many top tier vulnerabilities at pwn2own. Zerodium is definitely a bit too well known to have actual market pricing for ...
-
[95]
The Global Zero-Day Market Exposed - When Even Amateur ...Apr 11, 2025 · These initiatives, along with hacking contests like Pwn2Own, provide a structured and lawful market for exploits—where vulnerabilities are ...
-
[96]
SharePoint exploit: the ToolShell attack timeline | White Blue OceanSep 25, 2025 · A Pwn2Own exploit for Microsoft SharePoint has being used to attack US government agencies and businesses. The attack, called ToolShell, has ...
-
[97]
SharePoint ToolShell | Zero-Day Exploited in-the-Wild ... - SentinelOneJul 21, 2025 · SentinelOne shares distinct attack clusters and a detailed timeline of events on an active exploit of the ToolShell 0-day in MS SharePoint.<|control11|><|separator|>
-
[98]
ToolShell - A Critical SharePoint Vulnerability Chain under Active ...Jul 24, 2025 · In July 2025, Viettel Threat Intelligence observed an actively exploited chain of critical vulnerabilities targeting Microsoft SharePoint ...
-
[99]
From Targeting Pwn2Own Vulnerabilities to Shotgunning ExploitsOct 9, 2025 · December 6, 2022: Tri Dang and Bien Pham (@bienpnn) from Qrious Secure exploit the WAN interface of TP-Link AX1800 at Pwn2Own Toronto 2022.Missing: changes 2011-2022