<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[In another video highlight from Day 1 of #Pwn2Own Berlin, Valentina Palmiatti of IBM X-Force Offensive Research (XOR) used a single bug to exploit NV Container Toolkit, earning $50,000 and 5 Master of Pwn points.]]></title><description><![CDATA[<p>In another video highlight from Day 1 of <a href="https://infosec.exchange/tags/Pwn2Own" rel="tag">#<span>Pwn2Own</span></a> Berlin, Valentina Palmiatti of IBM X-Force Offensive Research (XOR) used a single bug to exploit NV Container Toolkit, earning $50,000 and 5 Master of Pwn points. <a href="https://youtube.com/shorts/cuJKJaAhPgc" rel="nofollow noopener"><span>https://</span><span>youtube.com/shorts/cuJKJaAhPgc</span><span></span></a> <a href="https://infosec.exchange/tags/P2OBerlin" rel="tag">#<span>P2OBerlin</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/b1b25ac2-1b68-4ce9-b7f4-8e110a02ae3d/in-another-video-highlight-from-day-1-of-pwn2own-berlin-valentina-palmiatti-of-ibm-x-force-offensive-research-xor-used-a-single-bug-to-exploit-nv-container-toolkit-earning-50-000-and-5-master-of-pwn-points.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 10:23:54 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/b1b25ac2-1b68-4ce9-b7f4-8e110a02ae3d.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 14 May 2026 11:35:41 GMT</pubDate><ttl>60</ttl></channel></rss>