Father
Professional
- Messages
- 2,602
- Reaction score
- 761
- Points
- 113
China is launching its Pwn2Own called Matrix Cup, modeled after another well-known Chinese hacking contest, the Tianfu Cup.
The new Chinese duel was quickly called "the main cybersecurity competition in the eastern hemisphere."
The prize pool for the first stage will be 20 million yuan ($2.75 million), including 18 million yuan ($2.5 million) for 0-day exploits.
It will be held on June 26-28 in Qingdao, organized by Qihoo 360 and Beijing Huayun'an Information Technology.
The target list includes Chinese and Western products, as well as artificial intelligence algorithms.
Among them: Windows, Linux and macOS operating systems, Samsung Galaxy devices, Google Pixel, iPhone and other Chinese brands, corporate products from Microsoft, Zimbra, F5 and Citrix, network devices from Cisco, Juniper Networks, Sonicwall and Linksys, NAS devices from WD, Synology and QNAP, as well as security solutions from Fortinet, Checkpoint, Cisco, Ivanti, and Kaspersky.
In addition, MariaDB, SQL Server, MySQL, and Oracle Database products, Adobe Reader, Microsoft Teams, Zoom, and Microsoft Office tools, Chrome, Firefox, Edge, and Safari browsers, VMware, QEMU, Docker, Microsoft, and Oracle virtualization technologies, HP printers, and the Hadoop platform are announced.
The truth about how suppliers will be informed is not mentioned on the official website, unlike the same Pwn2Own from Trend Micro.
We can only state that according to Chinese law, in any case, the Government of the People's Republic of China will be informed first of all about all 0-days.
However, in the West, the Chinese equivalent of Pwn2Own is actively criticized, accusing it of using exploits that appeared on Tianfu Cup in APT operations.
On the other hand, Western opponents have repeatedly come across the fact that the same 0-day was implemented at the development stage, and then fixed retroactively in their ballots. Microsoft won't let you lie.
The new Chinese duel was quickly called "the main cybersecurity competition in the eastern hemisphere."
The prize pool for the first stage will be 20 million yuan ($2.75 million), including 18 million yuan ($2.5 million) for 0-day exploits.
It will be held on June 26-28 in Qingdao, organized by Qihoo 360 and Beijing Huayun'an Information Technology.
The target list includes Chinese and Western products, as well as artificial intelligence algorithms.
Among them: Windows, Linux and macOS operating systems, Samsung Galaxy devices, Google Pixel, iPhone and other Chinese brands, corporate products from Microsoft, Zimbra, F5 and Citrix, network devices from Cisco, Juniper Networks, Sonicwall and Linksys, NAS devices from WD, Synology and QNAP, as well as security solutions from Fortinet, Checkpoint, Cisco, Ivanti, and Kaspersky.
In addition, MariaDB, SQL Server, MySQL, and Oracle Database products, Adobe Reader, Microsoft Teams, Zoom, and Microsoft Office tools, Chrome, Firefox, Edge, and Safari browsers, VMware, QEMU, Docker, Microsoft, and Oracle virtualization technologies, HP printers, and the Hadoop platform are announced.
The truth about how suppliers will be informed is not mentioned on the official website, unlike the same Pwn2Own from Trend Micro.
We can only state that according to Chinese law, in any case, the Government of the People's Republic of China will be informed first of all about all 0-days.
However, in the West, the Chinese equivalent of Pwn2Own is actively criticized, accusing it of using exploits that appeared on Tianfu Cup in APT operations.
On the other hand, Western opponents have repeatedly come across the fact that the same 0-day was implemented at the development stage, and then fixed retroactively in their ballots. Microsoft won't let you lie.