Ethical hackers exploited zero-day vulnerabilities against popular OS, browsers, VMs and AI frameworks | CSO Online

The article describes the findings of the Pwn2Own contest, a competition where ethical hackers demonstrated vulnerabilities in popular software products. The contest highlighted the importance of addressing vulnerabilities in operating systems, browsers, virtual machines, and AI tools.

*****
Written on