
82: Master of Pwn
Darknet Diaries
The Evolution of Pwn2Own: From Browsers to Industrial Control Systems
This chapter explores the transformation of the Pwn2Own competition from its origins focused on browsers to encompassing a wide range of technologies, including enterprise applications and IoT devices. It also examines the implications for vendors who are increasingly aware of their product vulnerabilities and their mixed reactions to being challenged in this important cybersecurity event.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.