Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
.5 Million Offered in New Cloud Hacking Competition

$4.5 Million Offered in New Cloud Hacking Competition

Posted on October 6, 2025October 6, 2025 By CWS

Cloud safety big Wiz has introduced a brand new hacking competitors the place contributors can earn vital rewards for demonstrating exploits towards extensively used cloud software program.

The competitors is called Zeroday.Cloud and it affords contributors a complete of $4.5 million in bug bounties. safety researchers should submit their entry by December 1 and they’re going to reveal their exploits dwell on stage on the Black Hat Europe convention happening December 10-11 in London. 

Wiz has teamed up with AWS, Google Cloud and Microsoft for Zeroday.Cloud. It’s value noting that Google has introduced plans to amass Wiz for $32 billion. 

The Zeroday.Cloud hacking competitors covers six classes. Considered one of them is AI, with contributors being provided most prizes ranging between $25,000 and $40,000 for hacking merchandise corresponding to Ollama, vLLM, and Nvidia Container Toolkit.  

Within the Kubernetes and cloud native class, prizes vary between $10,000 and $80,000 for exploits concentrating on the Kubernetes API Server, Kubelet Server, Grafana, Prometheus, and Fluent Bit. The best reward is for Kubernetes API Server exploits.

The containers and virtualization class covers Docker, Containerd, and Linux Kernel, with prizes ranging between $30,000 and $60,000. 

Within the net server class, contributors can earn as much as $300,000 for Nginx exploits, $100,000 for Tomcat exploits, and as much as $50,000 for Caddy and Envoy vulnerabilities. 

Database hacks can even earn vital rewards — as much as $100,000 is being provided for unauthenticated distant code execution exploits concentrating on Redis, PostgreSQL, and MariaDB. Commercial. Scroll to proceed studying.

Vulnerabilities in DevOps and automation software program corresponding to Apache Airflow, Jenkins, and GitLab CE can earn Zeroday.Cloud contributors as much as $40,000. 

“Submitted exploits ought to lead to complete compromise of the goal, which means a full Container/VM Escape for the Virtualization class, and a 0-click Distant Code Execution (RCE) vulnerability for different targets,” defined Nir Ohfeld, head of vulnerability analysis at Wiz. 

Given the numerous prize pool and the standing of its backers, the cloud hacking competitors has a excessive chance of success. Nevertheless, it additionally seems to be dealing with some controversy.

Pattern Micro, whose Zero Day Initiative (ZDI) has been organizing the Pwn2Own hacking competitors for almost twenty years, has accused Wiz of copying some sections of its guidelines word-for-word. 

Associated: $1 Million Provided for WhatsApp Exploit at Pwn2Own Eire 2025

Associated: VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched

Associated: Microsoft Gives $5 Million at Zero Day Quest Hacking Contest

Security Week News Tags:Cloud, Competition, Hacking, Million, Offered

Post navigation

Previous Post: Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks
Next Post: Microsoft Teams Set to Introduce Highly Anticipated Multitasking Functionality

Related Posts

Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims Security Week News
Unbound Raises  Million to Secure Gen-AI Adoption Unbound Raises $4 Million to Secure Gen-AI Adoption Security Week News
All Microsoft Entra Tenants Were Exposed to Silent Compromise via Invisible Actor Tokens: Researcher All Microsoft Entra Tenants Were Exposed to Silent Compromise via Invisible Actor Tokens: Researcher Security Week News
XWiki Vulnerability Exploited in Cryptocurrency Mining Operation XWiki Vulnerability Exploited in Cryptocurrency Mining Operation Security Week News
Venice Security Secures M for Access Management Venice Security Secures $33M for Access Management Security Week News
Chinese Threat Actor Uses DKnife Implant for Attacks Chinese Threat Actor Uses DKnife Implant for Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark