@jhr77 @christopherkunz @buherator
Ah, so this is fascinating.
It appears that Microsoft did NOT address RedSun. They merely added a definition to discover the post-modified TieringEngineService.exe binary (which is the RedSun.exe file itself).
And if you aren't careful, like I wasn't, you might at a glance think that Microsoft broke the RedSun exploit. But that is wrong! They merely now detect the post-exploit-modified binary that RedSun chooses to modify. 🤦♂️
They: "On a scale from 1 to 10: How lazy are you?"
Me: Using copy fail instead of sudo to gain root to avoid having to type my password
Fast Travel
Sources and bonus timelapse: https://www.peppercarrot.com/en/miniFantasyTheater/050.html
It's official! Kentaro Kawane of GMO Cybersecurity by Ierae chained 2 Use-After-Free bugs to escalate privileges on Microsoft Windows 11 in the third round, earning $15,000 and 3 Master of Pwn points. #Pwn2Own #P2OBerlin
Calif demonstrates a not-yet-fixed data-only macOS kernel LPE. MIE, which is available on M5 Macs, does not thwart the attack.
https://blog.calif.io/p/first-public-kernel-memory-corruption
Yesterday I attended the first Democratic Tech Alliance (DTA) Assembly over at the European Parliament. The DTA is a political/think tank/civil society/industry initiative that hopes to foster a tech-ecosystem on which we can continue to run our European democracies. Because it is not looking good. Useful progress was made, and here is what I learned: https://berthub.eu/articles/posts/democratic-tech-alliance-may-2026/
In a video highlight from Day 1 of #Pwn2Own Berlin, Orange Tsai of the DEVCORE Research Team takes on Microsoft Edge with a sandbox escape! He earns $175,000 and 17.5 Master of Pwn points. https://youtube.com/shorts/8ngMzEVrdVs?feature=share
Nice work! Angelboy & TwinkleStar03 (@scwuaptx & @_twinklestar03) of DEVCORE Research Team + DEVCORE Internship Program was able to exploit Microsoft Windows 11! If confirmed, they win $30,000 and 3 Master of Pwn points. They're off to the disclosure room to explain how they did it. #Pwn2Own #P2OBerlin
I worked at a fairly big tech co years before the AI boom. People did large scale refractoring across huge code bases back then. With refactoring tools. And properly written robots.
Applying changes to code at scale, opening PRs automatically, basic interaction with human reviewers, making sure tests pass, getting things merged when ready. All that already existed before LLMs. And it was actually reliable and not capable of hallucinating terrible things.
It's like we've forgotten how to automate things without LLMs and openclaw now...
Amaze! Amaze! Amaze! Orange Tsai of DEVCORE Research Team was able to exploit Edge with a sandbox escape! If confirmed, we wins $175K. He's off to the disclosure room to explain how he did it. #Pwn2Own #P2OBerlin
Boom! Valentina Palmiotti wastes no time kicking off #Pwn2Own Berlin in style. She requires just a few second to get code execution on the NV Container Toolkit. She heads off to the disclosure room to provide all the details.
I have published #Diaphora 3.4.0. Now you can install it in IDA by just running this:
$ hcli plugin install diaphora
A 0-click exploit chain for the Pixel 10: When a Door Closes, a Window Opens https://projectzero.google/2026/05/pixel-10-exploit.html
Google replaces your PC mouse with yelling at Gemini
‘reimagining’ the mouse pointer
https://www.youtube.com/watch?v=NSWCWnLMj-U&list=UU9rJrMVgcXTfa8xuMnbhAEA - video
https://pivottoai.libsyn.com/20260513-google-replaces-your-mouse-with-yelling-at-gemini - podcast
time: 5 min 38 sec
https://pivot-to-ai.com/2026/05/13/google-replaces-your-pc-mouse-with-yelling-at-gemini/ - blog post