Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
JDownloader Compromised: Malicious Windows & Linux
May 16, 2026
Malicious JPEG Images Exploit PHP Memory Safety Could Trigger
May 16, 2026
Home/CyberSecurity News/Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
CyberSecurity News

Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor

Day Two of Pwn2Own Berlin 2026 delivered a fresh wave of critical zero-day exploits, solidifying its position as one of the most intense offensive security contests in recent years. Researchers...

Marcus Rodriguez
Marcus Rodriguez
May 16, 2026 3 Min Read
1 0

Day Two of Pwn2Own Berlin 2026 delivered a fresh wave of critical zero-day exploits, solidifying its position as one of the most intense offensive security contests in recent years. Researchers successfully targeted enterprise software, AI tools, and operating systems.

Security researchers demonstrated real-world attack scenarios against high-value targets, including Microsoft Exchange, Windows 11, and AI coding platforms, highlighting the growing attack surface in modern environments.

Following a strong opening day, the second day added $385,750 in rewards for 15 new zero-day vulnerabilities, pushing the total to $908,750 and 39 unique bugs discovered so far. DEVCORE continues to dominate the leaderboard, largely due to a high-impact Microsoft Exchange compromise.

Microsoft Exchange RCE Steals the Spotlight

The most significant exploit of the day came from Orange Tsai of DEVCORE, who chained three vulnerabilities to achieve remote code execution (RCE) with SYSTEM privileges on Microsoft Exchange, as reported by Zero Day Initiative.

Microsoft Exchange Exploited (Source: Zero Day Initiative)
Microsoft Exchange Exploited (Source: Zero Day Initiative)

This full-chain attack earned $200,000 and 20 Master of Pwn points, making it the highest-value exploit of the event so far.

This type of attack is particularly dangerous because Exchange servers often sit at the core of enterprise communication. A successful RCE allows attackers to control email infrastructure fully, potentially enabling espionage, lateral movement, and data exfiltration.

For example, in a real-world scenario, an attacker exploiting Exchange could silently access internal emails, deploy malware, or impersonate executives in phishing campaigns.

Windows 11 and Linux Privilege Escalations

Operating systems were also heavily targeted. Siyeon Wi successfully exploited an integer overflow vulnerability in Windows 11, gaining elevated privileges and earning $7,500.

Windows 11 Exploited (Source: Zero Day Initative)
Windows 11 Exploited (Source: Zero Day Initative)

While smaller in payout, such bugs are critical because they can turn limited access into full system control.

On the Linux side, Ben Koo of Team DDOS exploited a use-after-free flaw to escalate privileges on Red Hat Enterprise Linux, reinforcing the fact that memory safety issues continue to plague core systems.

Linux exploited (Source: Zero Day Initative)
Linux exploited (Source: Zero Day Initative)

AI and developer-focused tools emerged as major targets this year. Notably:

  • Cursor IDE was successfully exploited twice by different teams, confirming multiple vulnerabilities in AI-assisted coding environments.
  • OpenAI Codex was compromised by the Summoning Team using a novel exploit chain.
  • LM Studio was the victim of a code-injection attack by OtterSec researchers.

These findings underline a key trend: AI-powered development tools are becoming high-value targets due to their access to source code and developer workflows.

Not all attempts were successful. Exploits targeting Apple Safari, Microsoft SharePoint, and Mozilla Firefox failed during execution, showing the increasing difficulty of reliable exploitation even when vulnerabilities are known.

Meanwhile, several entries resulted in “collision” outcomes, where researchers demonstrated valid exploits using previously discovered bugs. While still rewarded, these highlight overlapping research efforts within the security community.

With one day remaining, DEVCORE leads with 40.5 points and $405,000, but the race for “Master of Pwn” is still open. As more zero-days are expected, vendors, including Microsoft, Red Hat, and AI platform providers, will race to patch newly exposed vulnerabilities.

Pwn2Own Berlin continues to demonstrate how quickly attackers can chain multiple bugs into devastating exploits, offering defenders a critical early warning of what could soon appear in the wild.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwarePatchphishingSecurityVulnerabilityzero-day

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

JDownloader Compromised: Malicious Windows & Linux

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us