CybersecurityInnovationSoftware

WhatsApp Zero-Click Exploit Claim Dominates Pwn2Own Security Competition

The Pwn2Own hacking competition in Ireland has become the stage for a major security mystery involving a claimed WhatsApp zero-click exploit. Meanwhile, organizers report that preventable buffer overflow vulnerabilities continue to plague new devices despite decades of awareness.

Mysterious WhatsApp Zero-Click Claim Captures Attention

The ongoing Pwn2Own security competition in Ireland has generated significant buzz around an unverified claim from a mysterious researcher who reportedly possesses a zero-click exploit for Meta’s WhatsApp messaging application, according to event organizers. Sources indicate the individual has claimed the capability to compromise the encrypted messaging app without requiring any user interaction, potentially earning a $1 million prize if demonstrated successfully.

CybersecurityTechnology

Hackers Weaponize Public Blockchains for Indestructible Malware Distribution

Cybersecurity researchers have uncovered a sophisticated attack method where hackers embed malicious code directly into blockchain smart contracts. This technique creates nearly indestructible malware distribution systems that leverage blockchain’s decentralization against security teams.

Blockchain Technology Repurposed for Cyberattacks

According to reports from Google’s Threat Intelligence Group, hackers are exploiting the fundamental properties of blockchain technology to create resilient malware distribution systems that security teams struggle to dismantle. The technique, which researchers call EtherHiding, represents what analysts describe as next-generation bulletproof hosting that leverages the immutable nature of distributed ledger systems.