Calif demonstrates a not-yet-fixed data-only macOS kernel LPE. MIE, which is available on M5 Macs, does not thwart the attack.
https://blog.calif.io/p/first-public-kernel-memory-corruption
Yesterday I attended the first Democratic Tech Alliance (DTA) Assembly over at the European Parliament. The DTA is a political/think tank/civil society/industry initiative that hopes to foster a tech-ecosystem on which we can continue to run our European democracies. Because it is not looking good. Useful progress was made, and here is what I learned: https://berthub.eu/articles/posts/democratic-tech-alliance-may-2026/
In a video highlight from Day 1 of #Pwn2Own Berlin, Orange Tsai of the DEVCORE Research Team takes on Microsoft Edge with a sandbox escape! He earns $175,000 and 17.5 Master of Pwn points. https://youtube.com/shorts/8ngMzEVrdVs?feature=share
Nice work! Angelboy & TwinkleStar03 (@scwuaptx & @_twinklestar03) of DEVCORE Research Team + DEVCORE Internship Program was able to exploit Microsoft Windows 11! If confirmed, they win $30,000 and 3 Master of Pwn points. They're off to the disclosure room to explain how they did it. #Pwn2Own #P2OBerlin
I worked at a fairly big tech co years before the AI boom. People did large scale refractoring across huge code bases back then. With refactoring tools. And properly written robots.
Applying changes to code at scale, opening PRs automatically, basic interaction with human reviewers, making sure tests pass, getting things merged when ready. All that already existed before LLMs. And it was actually reliable and not capable of hallucinating terrible things.
It's like we've forgotten how to automate things without LLMs and openclaw now...
Amaze! Amaze! Amaze! Orange Tsai of DEVCORE Research Team was able to exploit Edge with a sandbox escape! If confirmed, we wins $175K. He's off to the disclosure room to explain how he did it. #Pwn2Own #P2OBerlin
Boom! Valentina Palmiotti wastes no time kicking off #Pwn2Own Berlin in style. She requires just a few second to get code execution on the NV Container Toolkit. She heads off to the disclosure room to provide all the details.
I have published #Diaphora 3.4.0. Now you can install it in IDA by just running this:
$ hcli plugin install diaphora
A 0-click exploit chain for the Pixel 10: When a Door Closes, a Window Opens https://projectzero.google/2026/05/pixel-10-exploit.html
Google replaces your PC mouse with yelling at Gemini
‘reimagining’ the mouse pointer
https://www.youtube.com/watch?v=NSWCWnLMj-U&list=UU9rJrMVgcXTfa8xuMnbhAEA - video
https://pivottoai.libsyn.com/20260513-google-replaces-your-mouse-with-yelling-at-gemini - podcast
time: 5 min 38 sec
https://pivot-to-ai.com/2026/05/13/google-replaces-your-pc-mouse-with-yelling-at-gemini/ - blog post
Hey nerds!
I made a thing!
It's a "chore tracker*, but I took a somewhat unique take on the subject 🙈
It tracks when did you last completed a chore and how close are you to the desired frequency you set for that particular chore.
You can access it here: https://chores-mvp.azurewebsites.net/
There is #privacy policy as well. I hope it will answer most of the questions.
You can self-host it if you're into that sort of things.
The Junkyard Call for Bugs is officially open! 👾
www.districtcon.org/junkyard
For additional information, please reference our Disclosure Guidance doc: lnkd.in/ewjswJyf
And if you missed last years presentations, check them out on YouTube now: https://www.youtube.com/@DistrictCon/shorts