cybersecurity

Winsage
May 14, 2026
On the inaugural day of Pwn2Own Berlin 2026, a total of ,000 was awarded to security researchers for exploiting 24 unique zero-day vulnerabilities. Orange Tsai earned ,000 for chaining four logic bugs to achieve a sandbox escape on Microsoft Edge. Windows 11 was targeted by Angelboy, TwinkleStar03, Marcin Wiązowski, and Kentaro Kawane, each earning ,000 for demonstrating new privilege escalation zero-days. Valentina Palmiotti earned ,000 for rooting Red Hat Linux for Workstations and an additional ,000 for a zero-day in the NVIDIA Container Toolkit. Other notable exploits included k3vg3n earning ,000 for taking down LiteLLM, Satoki Tsuji and haehae earning ,000 for exploiting NVIDIA Megatron Bridge zero-days, Compass Security and maitai earning ,000 each for hacking OpenAI's Codex, haehae earning ,000 for a Chroma zero-day, and STARLabs SG earning ,000 for exploiting a LM Studio zero-day. The DEVCORE Research Team leads the competition with ,000 in earnings, followed by Valentina Palmiotti with ,000. The contest is held at the OffensiveCon conference from May 14 to May 16, with over ,000,000 in cash and prizes available. Participants must target fully patched products and demonstrate arbitrary code execution. Vendors have a 90-day window to release security fixes after zero-day flaws are disclosed. Last year, the TrendMicro Zero Day Initiative awarded ,078,750 for 29 zero-day vulnerabilities.
Tech Optimizer
May 14, 2026
Avast Antivirus offers a suite of cybersecurity features, including real-time malware defense, phishing protection, and performance optimization for Windows, Mac, Android, and iOS. It has over 150 million users globally and provides both free and premium plans. The software employs a multi-layered defense strategy, including behavior-based detection and cloud-assisted scanning, and can perform quick and deep scans for malware. Key features include a Wi-Fi Inspector, Software Updater, and mobile protection against harmful applications. Avast blocks over 1.5 billion attacks monthly and offers parental controls in premium plans. It serves users in over 170 countries, particularly in North America and Europe, and operates under Gen Digital, which is publicly traded on Nasdaq.
Winsage
May 14, 2026
Microsoft has introduced MDASH (Multi-Model Agentic Scanning Harness), a security solution that uses over 100 specialized AI agents to identify software vulnerabilities. On May 12, 2026, MDASH identified 16 new vulnerabilities (CVEs) in the Windows networking and authentication stack, four of which were critical, including remote code execution vulnerabilities in tcpip.sys, ikeext.dll, netlogon.dll, and dnsapi.dll. Ten of these vulnerabilities can be accessed over the network without authentication. MDASH operates through a four-stage pipeline: analyzing source code, scrutinizing for suspicious elements, debating the exploitability of issues, and attempting to exploit vulnerabilities. The system is model-agnostic and allows integration of new models and domain-specific knowledge. MDASH scored 88.45 percent on the CyberGym benchmark, ranking first among competitors, although the comparison may not be entirely fair as it contrasts a comprehensive framework with individual models. The models used to achieve this score are not specified. MDASH is supported by Microsoft's Autonomous Code Security Team and is currently in a limited private preview for select customers.
Winsage
May 14, 2026
An anonymous cybersecurity researcher disclosed two new zero-day vulnerabilities affecting Microsoft systems: YellowKey and GreenPlasma. YellowKey is a BitLocker bypass that operates as a backdoor within the Windows Recovery Environment, impacting Windows 11 and Windows Server 2022/2025. Exploiting YellowKey involves copying specially crafted files to a USB drive, connecting it to a Windows computer, and rebooting into WinRE. The researcher expressed skepticism about Microsoft's response time to this vulnerability, noting that using TPM+PIN does not mitigate the risk. GreenPlasma is a privilege escalation vulnerability that allows an unprivileged user to obtain a shell with SYSTEM permissions through arbitrary section creation in Windows CTFMON. The proof-of-concept for this exploit is incomplete but indicates potential manipulation of trusted privileged services or drivers. Additionally, a related attack against BitLocker was detailed by French cybersecurity firm Intrinsec, which exploits a boot manager downgrade using CVE-2025-48804 to bypass encryption protections on fully patched Windows 11 systems. This method allows attackers to boot from a controlled WIM while the boot manager checks the legitimate one, executing with the decrypted BitLocker volume. Despite Microsoft releasing fixes for this defect in July 2025, a flaw in Secure Boot verification allows a vulnerable boot manager to bypass BitLocker safeguards. To mitigate these risks, enabling a BitLocker PIN at startup and migrating to a new boot manager certificate is recommended.
Winsage
May 14, 2026
Microsoft has introduced MDASH, a platform that enhances vulnerability discovery using artificial intelligence, developed by the Autonomous Code Security Team and the Windows Attack Research and Protection group. MDASH has identified 16 previously unknown vulnerabilities in various Windows components, including four critical remote code execution vulnerabilities (CVE‑2026‑33827 and CVE‑2026‑33824). The platform achieved zero false positives during testing and is currently used internally at Microsoft and in a private preview for select partners.
Tech Optimizer
May 14, 2026
Kaspersky partnered with AnyMind Group in March 2026 to launch an influencer marketing campaign in Singapore aimed at changing consumer perceptions that Kaspersky only offers antivirus protection. The campaign focused on building trust through relatable narratives, increasing urgency around scam prevention, and driving traffic to the Kaspersky Shopee Store. It utilized Instagram for engagement, featuring relatable stories and humor to simplify complex cybersecurity topics. The campaign achieved significant reach and engagement, with total reach exceeding 160,000, total views at 223,000, and total engagements of 7,500. The engagement rate was 4.73%, and the reach rate was 40.56%. Influencer Faris Samri had the highest engagement rate at 17.20%. The campaign led to a 2,900% increase in store page views and over 6,000 combined saves and shares, indicating high user value in the content. Interactive Instagram Stories were identified as the key driver for direct link clicks.
Tech Optimizer
May 14, 2026
Gen Digital Inc. operates in the cybersecurity and software sector, headquartered in the United States. The company focuses on consumer protection against cyber risks through a subscription-based model, primarily offering products under the Norton and Avast brands. In fiscal Q1 2026, Gen Digital reported revenues of million, a 3% increase year-over-year, with subscriptions accounting for 95% of total revenue in fiscal 2025. The company serves over 150 million users globally, with endpoint protection revenue reaching million and identity and privacy services contributing million in fiscal Q1 2026. The average revenue per user (ARPU) rose to .30 during this period. Gen Digital holds approximately 20% of the global consumer antivirus market share and is positioned favorably against competitors like McAfee and Bitdefender. The cybersecurity market is projected to grow at an annual rate of 12% through 2030, with 50% of Gen Digital's revenue generated from North America.
Tech Optimizer
May 13, 2026
Every device connected to a corporate network, including laptops, desktops, servers, and mobile phones, can be a potential gateway for cyberattacks. AI-powered Endpoint Detection and Response (EDR) solutions are essential in modern cybersecurity strategies, utilizing behavioral analysis, real-time monitoring, and machine learning to detect, investigate, and respond to advanced threats. Traditional antivirus software, which relies on known malicious signatures, is becoming ineffective against modern attackers who use fileless attacks and custom-built malware. EDR continuously monitors endpoint activity, capturing behavioral data to identify anomalies consistent with attacks. It provides forensic capabilities to help security teams understand how breaches occur. EDR is a critical component of a multi-layered security architecture, complementing other security measures like firewalls and patch management. When choosing an EDR solution, organizations should consider real-time detection, automated response capabilities, integration with existing security tools, and ease of investigation.
Search