Pwn2Own Berlin 2026: Researchers Uncover 47 Zero-Days, $1.3M Payout
The Pwn2Own Berlin 2026 hacking contest has concluded, with security researchers demonstrating 47 zero-day vulnerabilities and collecting a staggering $1,298,250 in bounties. BleepingComputer reports that participants successfully exploited various targets, highlighting critical weaknesses across widely used software and platforms.
This event is not just a competition; itβs a stark reminder of the constant arms race in cybersecurity. The sheer number of zero-days discovered, and the significant payouts, underscore the deep technical skill required to find these flaws and the immediate value they hold for both defensive patching and offensive exploitation.
For defenders, this means a fresh wave of patches is coming. Vendors whose products were exploited now have direct, actionable intelligence to harden their offerings. However, it also means that for a period, these vulnerabilities existed, potentially unknown, and could have been exploited by malicious actors.
What This Means For You
- If your organization uses any products typically targeted at Pwn2Own (browsers, virtualization, enterprise applications, cloud services), be ready. Expect a flurry of patches in the coming weeks and months. Prioritize these updates. These aren't theoretical flaws; they are proven, exploitable zero-days that could be weaponized quickly.