sagitz
@sagitz_
Followers
5K
Following
4K
Media
50
Statuses
255
Cloud Security Researcher at @wiz_io • Microsoft Most Valuable Researcher 21/22/23 • Black Hat Speaker • Ask me anything about https://t.co/57lyhfcUee
Joined March 2019
In case you missed it: $4.5M in bounties (up to $300k per target!) are up for grabs for open source software in the https://t.co/dxX5mPJ1o3 competition 🤯 We've partnered with all major cloud providers to offer massive rewards and recognize vulnerability research excellence 🎯
1
7
20
ICYMI, we increased the bounties for multiple targets on https://t.co/RXht9mTosf If you have any questions regarding scope or configurations, please let me know - my DM is open Good luck!
0
2
5
ZeroDayCloud updates! Bigger bounties, extended scope - prize pool is now at $5M! We expanded the scope for Grafana, Ubuntu & GitLab, and increased the bounties for key targets 💰 Venue access is free w/ prize-winning on-site CTF (stay tuned... 😉) & lots of surprises Secure
1
6
38
We just released Game of Pods - a new Kubernetes CTF! 🔥 I packed it with the coolest and weirdest bugs I've found in k8s over the years. If you like hacking on k8s I think you’re gonna love it :)
🎃 Something spooky's brewing in the cloud... Introducing a new CTF challenge - "Game of Pods" 🕸️ 💀 Written by top Azure researcher @yuvalavra & worth 30 points, it's our BIGGEST challenge yet! Get your skills ready for zero-day cloud: https://t.co/biArWom71P
0
4
11
Need a partner to finish that exploit chain for https://t.co/iULfuMs1tL? We just launched our Research Collaboration Center at https://t.co/w4PrCPbL5l to connect researchers, combine skills, and meet the deadline. 🤝 The clock is ticking... ⏱️
1
5
22
🔥 Curious how we exploited CVE-2025-49844 (RediShell)? From a 2-bit reset to 0-click RCE. Come see me at Hexacon 2025 - Paris, where I’ll share in-depth technical details on the exploitation. See you on Friday 👋 #Redis #Security #RediShell
@hexacon_fr
1
14
102
Excited to be a part of #ZeroDayCloud on the floor at Black Hat Europe this year. Let's work together to help secure open-source.
Introducing https://t.co/iULfuMrtEd🕵️♀️ Be the first to participate in the first-of-its-kind cloud hacking competition. 🤝 WIN PRIZES from our 4.5M$ prize pool. 💰 Register your exploit > https://t.co/pr7GC5uRqu
@msftsecresponse @awscloud @googlecloud
3
4
17
Google Cloud is excited to be part of an event that focuses on OSS and will help improve security for all Cloud users:
Introducing https://t.co/iULfuMrtEd🕵️♀️ Be the first to participate in the first-of-its-kind cloud hacking competition. 🤝 WIN PRIZES from our 4.5M$ prize pool. 💰 Register your exploit > https://t.co/pr7GC5uRqu
@msftsecresponse @awscloud @googlecloud
3
11
71
For the first time ever, @awscloud, @msftsecurity, @googlecloud and @wiz_io Research are joining forces to launch https://t.co/ShlGzDWU0O at @BlackHatEvents EU! 🤯 Find critical vulns in open-source cloud software & get paid from our $4.5M prize pool👇 https://t.co/5M95aFAQKh
0
13
54
Introducing https://t.co/iULfuMrtEd🕵️♀️ Be the first to participate in the first-of-its-kind cloud hacking competition. 🤝 WIN PRIZES from our 4.5M$ prize pool. 💰 Register your exploit > https://t.co/pr7GC5uRqu
@msftsecresponse @awscloud @googlecloud
2
13
53
🚨 New CTF challenge just dropped: This one's going to hurt your brain (in the best way) Our researcher @galnagli has created the *trickiest* puzzle yet in our Ultimate Cloud Security Championship. He packed half a dozen advanced bug bounty techniques into one mind-bending
2
13
49
Fascinating talk by @benny_isaacs and Brakha about their beautiful exploit of a UAF vulnerability in the Redis Lua interpreter at the recent Pwn2Own. A must-watch! 🤩
📢 From 2-Bit Reset to 0-Click RCE in Redis: A Pwn2Own Edition by Benny Isaacs (@benny_isaacs) & Nir Brakha
0
1
21
We (+@nirohfeld) found a critical vulnerability chain in NVIDIA's Triton Inference Server (CVE-2025-23319) that can lead to full Remote Code Execution (RCE). An unauthenticated attacker can remotely take over the server, a cornerstone of many AI/ML production environments. 🧵
2
19
46
We (+@ronenshh) hacked NVIDIA's Triton AI server by abusing a single error message🚨 The result is unauthenticated RCE allowing attackers to compromise the server and steal proprietary AI models🤯 For more details & mitigations check out our blog @wiz_io
https://t.co/v5kpI1eedL
4
61
232
When we asked @sagitz_ to create a container escape challenge, we honestly didn't believe he'd go this far 😲 The result is a really cool challenge that requires lots of creativity and solid technical skills. Think you got what it takes? 💫 https://t.co/e8V5UZkiVq
0
5
64
Are you up for a challenge? I authored a container security challenge for the @wiz_io Ultimate Cloud Security Championship 🤩 Put your skills to the test and try it out! 👇 https://t.co/tM7darq7FL
cloudsecuritychampionship.com
Join our monthly cloud security CTF challenge, built by top Wiz researchers. Solve real-world scenarios and rise to the top of the leaderboard.
0
19
53
🏆 Can you escape a container & become THE ULTIMATE CLOUD SECURITY CHAMPION? This month's scenario was crafted by @sagitz_ to explore container escape techniques, the same kind of risks we'll be diving into at @BlackHatEvents ! Challenge #2 👉 https://t.co/ubsu7JXvpE
0
6
27
I hacked a popular vibe coding platform with a simple, straight-forward logic flaw - allowing access to private applications . Here’s how I did it 🧵
40
241
2K
🚨 TraderTraitor: North Korea's cyber "traitor" inside the crypto world. This hacking crew hijacks dev workflows, poisons open-source, and compromises cloud environments — all to steal billions in crypto. Here's how they do it 🧵
1
7
18
We found a new container escape affecting all container runtimes using @NVIDIA GPUs. The crazy part? The exploit is just three lines long 🤯 This is the story of #NVIDIAScape 🧵👇
10
134
642