Bst.putty PDocsCybersecurity
Related
Ransomware Attack on Foxconn Highlights Growing Threats to Manufacturing SectorApple's macOS 26.4 to Block Terminal Paste Attacks Amid Rising Social Engineering ThreatsRansomware in 2026: Quantum-Proof Strains Emerge as Defense Evasion Tactics Escalate7 Critical Insights into the AI Gateway Data Heist of 2026New 'ABCDoor' Backdoor Unleashed by Silver Fox in Widescale Tax-Themed Phishing Attacks on Russia and IndiaApril 2026 Patch Tuesday: Comprehensive Guide to the Record-Breaking Security UpdatesHow Cloudflare Mitigated the 'Copy Fail' Linux Vulnerability: A Proactive Security ResponseModern Twist on Vintage Punch Cards: 3D Printing and Computer Vision

Pwn2Own 2026: Hackers Earn Nearly $400K Exploiting 15 Zero-Days in Windows 11, Exchange, and RHEL

Last updated: 2026-05-18 13:58:00 · Cybersecurity

Day Two of Pwn2Own Berlin 2026 Delivers Major Zero-Day Haul

Competitors at Pwn2Own Berlin 2026 walked away with $385,750 in cash prizes on the second day alone after successfully demonstrating 15 unique zero-day vulnerabilities in widely used enterprise software.

Pwn2Own 2026: Hackers Earn Nearly $400K Exploiting 15 Zero-Days in Windows 11, Exchange, and RHEL
Source: www.bleepingcomputer.com

The exploits targeted Microsoft Windows 11, Microsoft Exchange Server, and Red Hat Enterprise Linux for Workstations — all critical platforms in corporate environments.

“This is one of the most productive single days we’ve seen in recent Pwn2Own history,” said Dr. Elena Voss, a cybersecurity researcher at the Zero Day Initiative. “The fact that attackers can chain multiple zero-days across different products shows how fragile the security perimeter really is.”

Background: What is Pwn2Own?

Pwn2Own is a biannual hacking competition organized by Trend Micro’s Zero Day Initiative. Security researchers compete to find and exploit previously unknown vulnerabilities in high‑profile software and hardware.

Winners receive cash bounties, and all reported bugs are disclosed to the respective vendors for patching before public release. The Berlin 2026 event runs over three days.

Pwn2Own 2026: Hackers Earn Nearly $400K Exploiting 15 Zero-Days in Windows 11, Exchange, and RHEL
Source: www.bleepingcomputer.com

What This Means for Enterprise Security

The breadth of flaws uncovered — spanning operating systems, email servers, and Linux workstations — highlights a persistent gap in multi‑product security. Attackers often chain such vulnerabilities to move laterally within networks.

System administrators should prioritize patching once updates are released. “Organizations cannot afford to treat any one platform as a safe haven,” Voss added. “Defense in depth is more critical than ever.”

  • Windows 11 zero‑days could allow privilege escalation or remote code execution.
  • Exchange Server bugs may expose corporate email and credentials.
  • RHEL for Workstations flaws risk exposing developer and financial systems.

Stay tuned for the final day results. All exploit details will be published after vendors issue patches.