101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

486
active users

#pwn2own

0 posts0 participants0 posts today
IT Insights<p>Hackers verdienen €435.000 door exploits in SharePoint en VMware bij Pwn2Own 2025! Cybersecurity blijft cruciaal. <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a>&nbsp;<br><a href="https://itinsights.nl/cybersecurity/hackers-kraken-sharepoint-en-vmware-e435-000-buit/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">itinsights.nl/cybersecurity/ha</span><span class="invisible">ckers-kraken-sharepoint-en-vmware-e435-000-buit/</span></a></p>
Tom Schuster<p>We now have evidence that the strict Content-Security-Policy we added to the <a href="https://hachyderm.io/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a> fronted for hardening purposes prevent a Pwn2Own participant from escaping the sandbox! Definitely validates our approach.</p><p><a href="https://blog.mozilla.org/security/2025/05/17/firefox-security-response-to-pwn2own-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.mozilla.org/security/2025</span><span class="invisible">/05/17/firefox-security-response-to-pwn2own-2025/</span></a></p><p>P.S: Nice work from everyone for being the fastest to ship a fix for the <a href="https://hachyderm.io/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a> findings again.</p>
Trend Zero Day Initiative<p>Congrats to <span class="h-card" translate="no"><a href="https://mastodon.social/@mozilla" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mozilla</span></a></span> for being the first vendor to patch their <a href="https://infosec.exchange/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a> bugs. Oh - and go update <a href="https://infosec.exchange/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a> to get the fixes. That's two years in a row Mozilla has been the fastest. Well done!</p>
The New Oil<p>Hackers earn $1,078,750 for 28 zero-days at <a href="https://mastodon.thenewoil.org/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a> <a href="https://mastodon.thenewoil.org/tags/Berlin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Berlin</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-earn-1-078-750-for-28-zero-days-at-pwn2own-berlin/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hackers-earn-1-078-750-for-28-zero-days-at-pwn2own-berlin/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
James House-Lantto (He/Him)<p><a href="https://lifehacker.com/tech/mozilla-just-patched-two-firefox-zero-days" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lifehacker.com/tech/mozilla-ju</span><span class="invisible">st-patched-two-firefox-zero-days</span></a></p><p>Mozilla has released a security patch for two zero-day vulnerabilities identified at the recent Pwn2Own hacker contest held in Berlin, from May 15th - 17th.</p><p>Hackers at Pwn2Own won $50,000 each for their findings.</p><p><a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a> <a href="https://mastodon.social/tags/Mozilla" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mozilla</span></a> <a href="https://mastodon.social/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a> Announces Same-Day Update After Two Minor <a href="https://mastodon.thenewoil.org/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a> Exploits</p><p><a href="https://tech.slashdot.org/story/25/05/18/0558219/firefox-announces-same-day-update-after-two-minor-pwn2own-exploits" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tech.slashdot.org/story/25/05/</span><span class="invisible">18/0558219/firefox-announces-same-day-update-after-two-minor-pwn2own-exploits</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/Mozilla" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mozilla</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a></p>
Trend Zero Day Initiative<p>Confirmed!! Dung and Nguyen (@MochiNishimiya) of STARLabs used a TOCTOU race condition to escape the VM and an Improper Validation of Array Index for the Windows privilege escalation. They earn $70,000 and 9 Master of Pwn points. <a href="https://infosec.exchange/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a></p>
Trend Zero Day Initiative<p>Welcome to Day Three of <a href="https://infosec.exchange/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a> Berlin! Here's the schedule for this morning:</p>
The New Oil<p>Hackers exploit <a href="https://mastodon.thenewoil.org/tags/VMware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VMware</span></a> <a href="https://mastodon.thenewoil.org/tags/ESXi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESXi</span></a>, <a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.thenewoil.org/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> zero-days at <a href="https://mastodon.thenewoil.org/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-vmware-esxi-microsoft-sharepoint-zero-days-at-pwn2own/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hackers-exploit-vmware-esxi-microsoft-sharepoint-zero-days-at-pwn2own/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Hackread.com<p>🚨 Pwn2Own Berlin 2025 so far:</p><p>• $695,000 awarded over 2 days</p><p>• 39 zero-days across Windows 11, Red Hat, VMware, SharePoint, Docker &amp; more</p><p>• AI category sees first-ever successful exploit</p><p>Final day is tomorrow (May 17) </p><p>Total payouts may cross $1M.</p><p>Read: <a href="https://hackread.com/pwn2own-berlin-2025-windows-11-vmware-firefox-hacked/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/pwn2own-berlin-20</span><span class="invisible">25-windows-11-vmware-firefox-hacked/</span></a></p><p><a href="https://mstdn.social/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a> <a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
Trend Zero Day Initiative<p>Outstanding! Nguyen Hoang Thach of STARLabs SG used a single integer overflow to exploit <a href="https://infosec.exchange/tags/VMware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VMware</span></a> ESXi - a first in <a href="https://infosec.exchange/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a> history. He earns $150,000 and 15 Master of Pwn points. <a href="https://infosec.exchange/tags/P2OBerlin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>P2OBerlin</span></a></p>
Trend Zero Day Initiative<p>Confirmed!! Dinh Ho Anh Khoa of Viettel Cyber Security combined an auth bypass and an insecure deserialization bug to exploit <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> SharePoint. He earns $100,000 and 10 Master of Pwn points. <a href="https://infosec.exchange/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a> <a href="https://infosec.exchange/tags/P2OBerlin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>P2OBerlin</span></a></p>
Trend Zero Day Initiative<p>We have another bug collision. Mohand Acherir &amp; Patrick Ventuzelo of FuzzingLabs exploited <a href="https://infosec.exchange/tags/NVIDIA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NVIDIA</span></a> Triton, but the exploit they used was known by the vendor (but unpatched). They still earn $15,000 and 1.5 Master of Pwn points. <a href="https://infosec.exchange/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a> <a href="https://infosec.exchange/tags/P2OBerlin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>P2OBerlin</span></a></p>
Trend Zero Day Initiative<p>w00t!! Dinh Ho Anh Khoa of Viettel Cyber Security needed two attempts, but he successfully demonstrated his exploit of <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> SharePoint. If confirmed, he'll win $100,000 for his efforts. Off to the disclosure room! <a href="https://infosec.exchange/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a> <a href="https://infosec.exchange/tags/P2OBerlin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>P2OBerlin</span></a></p>
Trend Zero Day Initiative<p>Boom! Mohand Acherir &amp; Patrick Ventuzelo (@pat_ventuzelo) of FuzzingLabs (@fuzzinglabs) kick off Day Two in style by demonstrating their exploit of <a href="https://infosec.exchange/tags/NVIDIA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NVIDIA</span></a> Triton. They're off to the disclosure room to see if their exploit is unique. <a href="https://infosec.exchange/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a> <a href="https://infosec.exchange/tags/P2OBerlin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>P2OBerlin</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Windows11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows11</span></a> and <a href="https://mastodon.thenewoil.org/tags/RedHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedHat</span></a> <a href="https://mastodon.thenewoil.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> hacked on first day of <a href="https://mastodon.thenewoil.org/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/windows-11-and-red-hat-linux-virtualbox-hacked-on-first-day-of-pwn2own/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/windows-11-and-red-hat-linux-virtualbox-hacked-on-first-day-of-pwn2own/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a></p>
Trend Zero Day Initiative<p>Can't make it to <a href="https://infosec.exchange/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a> Berlin but want to see what happens during a live attempt? We're streaming two attempts live tomorrow here and on YouTube. Check us out at <a href="https://youtube.com/live/tLTJlWWa2Ws?feature=share" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtube.com/live/tLTJlWWa2Ws?f</span><span class="invisible">eature=share</span></a> <a href="https://infosec.exchange/tags/P2oBerlin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>P2oBerlin</span></a></p>
Trend Zero Day Initiative<p>In this behind the scenes look at <a href="https://infosec.exchange/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a> Berlin, Zed and Dustin have run into an interesting problem - no gear! <a href="https://youtube.com/shorts/Xj9Du8iuXCw?feature=share" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtube.com/shorts/Xj9Du8iuXCw</span><span class="invisible">?feature=share</span></a></p>
Tom Schuster<p>We just published my blog post about the recent work on hardening the <a href="https://hachyderm.io/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a> frontend against attacks we have seen demonstrated during <a href="https://hachyderm.io/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a>.</p><p><a href="https://attackanddefense.dev/2025/04/09/hardening-the-firefox-frontend-with-content-security-policies.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">attackanddefense.dev/2025/04/0</span><span class="invisible">9/hardening-the-firefox-frontend-with-content-security-policies.html</span></a></p>
Trend Zero Day Initiative<p>Building an electric vehicle simulator to research EVSEs: At <a href="https://infosec.exchange/tags/Pwn2Own" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn2Own</span></a> Automotive, we built a custom device to let the EV chargers "charge". ZDI researcher Thanos Kaliyanakis explains how to put one together for your research. <a href="https://www.zerodayinitiative.com/blog/2025/3/14/building-an-electric-vehicle-simulator-to-research-evses" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">zerodayinitiative.com/blog/202</span><span class="invisible">5/3/14/building-an-electric-vehicle-simulator-to-research-evses</span></a></p>