Security researcher earns $100,000 for discovering Safari exploitDiscovering security bugs can earn researchers big money.
What you need to know
Security researcher Jack Dates discovered a zero-day exploit with Safari.
The researcher earned $100,000 for the discovery.
The Zero Day Initiative pays security researchers to responsibly uncover vulnerabilities.
A security researcher has earned $100,000 for discovering a Safari exploit at the Zero Day hackathon event.
As reported by MacRumors, security researcher Jack Dates discovered a Safari to kernel zero-day exploit during the event, earning Dates $100,00.
Apple products were not heavily targeted in Pwn2Own 2021, but on day one, Jack Dates from RET2 Systems executed a Safari to kernel zero-day exploit and earned himself $100,000. He used an integer overflow in Safari and an OOB write to get kernel-level code execution, as demoed in the tweet below.
Other hacking attempts during the Pwn2Own event targeted Microsoft Exchange, Parallels, Windows 10, Microsoft Teams, Ubuntu, Oracle Virtua...
Source:
Security researcher earns $100,000 for discovering Safari exploit