
Hackers Win $1.3M For 47 Zero-Days
TL;DR: The Pwn2Own Berlin 2026 hacking competition has ended. Security researchers earned a total of $1,298,250 by successfully demonstrating 47 previously unknown zero-day vulnerabilities. The event highlights critical security weaknesses in widely used products and rewards ethical hackers for their discoveries.
Key facts
- Category
- Cybersecurity
- Impact
- Low
- Published
- Source
- BleepingComputer
Full summary
Security researchers earned nearly $1.3 million at the Pwn2Own Berlin hacking contest by demonstrating 47 new zero-day vulnerabilities in popular software.
The Pwn2Own Berlin 2026 hacking competition has concluded, with security researchers earning a total of $1,298,250 in prize money. Over the course of the event, participants successfully demonstrated 47 unique zero-day vulnerabilities. These are previously unknown software flaws that vendors have had no time to patch. The competition provides a controlled environment for ethical hackers to test the security of widely used software and hardware. By finding and responsibly disclosing these vulnerabilities, researchers help companies secure their products before the flaws can be exploited by malicious actors in the wild. The substantial prize money serves as a powerful incentive for this critical security research.
The discovery of 47 zero-day vulnerabilities is a significant reminder that even the most popular and well-resourced software products contain critical security weaknesses. For businesses, CTOs, and IT teams, this event serves as a crucial early warning system. Each vulnerability represents a potential entry point for attackers that could lead to data breaches or system takeovers. The vendors of the affected products are now working to develop and release patches. Security teams should monitor for these upcoming updates to ensure their systems are protected as soon as fixes become available, underscoring the importance of a proactive security posture.
Action checklist
- 1Identify which of your systems use software from major vendors targeted at Pwn2Own.
- 2Monitor security advisories from vendors whose products were featured in the competition.
- 3Prepare to test and deploy security patches as soon as they are released.
Primary source: BleepingComputer