sagitz Profile
sagitz

@sagitz_

Followers
5K
Following
4K
Media
50
Statuses
255

Cloud Security Researcher at @wiz_io • Microsoft Most Valuable Researcher 21/22/23 • Black Hat Speaker • Ask me anything about https://t.co/57lyhfcUee

Joined March 2019
Don't wanna be here? Send us removal request.
@sagitz_
sagitz
20 days
In case you missed it: $4.5M in bounties (up to $300k per target!) are up for grabs for open source software in the https://t.co/dxX5mPJ1o3 competition 🤯 We've partnered with all major cloud providers to offer massive rewards and recognize vulnerability research excellence 🎯
1
7
20
@sagitz_
sagitz
3 hours
ICYMI, we increased the bounties for multiple targets on https://t.co/RXht9mTosf If you have any questions regarding scope or configurations, please let me know - my DM is open Good luck!
0
2
5
@nirohfeld
Nir Ohfeld
23 hours
ZeroDayCloud updates! Bigger bounties, extended scope - prize pool is now at $5M! We expanded the scope for Grafana, Ubuntu & GitLab, and increased the bounties for key targets 💰 Venue access is free w/ prize-winning on-site CTF (stay tuned... 😉) & lots of surprises Secure
1
6
38
@yuvalavra
Yuval Avrahami
1 day
We just released Game of Pods - a new Kubernetes CTF! 🔥 I packed it with the coolest and weirdest bugs I've found in k8s over the years. If you like hacking on k8s I think you’re gonna love it :)
@wiz_io
Wiz
1 day
🎃 Something spooky's brewing in the cloud... Introducing a new CTF challenge - "Game of Pods" 🕸️ 💀 Written by top Azure researcher @yuvalavra & worth 30 points, it's our BIGGEST challenge yet! Get your skills ready for zero-day cloud: https://t.co/biArWom71P
0
4
11
@wiz_io
Wiz
5 days
Need a partner to finish that exploit chain for https://t.co/iULfuMs1tL? We just launched our Research Collaboration Center at https://t.co/w4PrCPbL5l to connect researchers, combine skills, and meet the deadline. 🤝 The clock is ticking... ⏱️
1
5
22
@benny_isaacs
Benny Isaacs
20 days
🔥 Curious how we exploited CVE-2025-49844 (RediShell)? From a 2-bit reset to 0-click RCE. Come see me at Hexacon 2025 - Paris, where I’ll share in-depth technical details on the exploitation. See you on Friday 👋 #Redis #Security #RediShell @hexacon_fr
1
14
102
@msftsecresponse
Microsoft Security Response Center
28 days
Excited to be a part of #ZeroDayCloud on the floor at Black Hat Europe this year. Let's work together to help secure open-source.
@wiz_io
Wiz
28 days
Introducing https://t.co/iULfuMrtEd🕵️‍♀️ Be the first to participate in the first-of-its-kind cloud hacking competition. 🤝 WIN PRIZES from our 4.5M$ prize pool. 💰 Register your exploit > https://t.co/pr7GC5uRqu @msftsecresponse @awscloud @googlecloud
3
4
17
@GoogleVRP
Google VRP (Google Bug Hunters)
25 days
Google Cloud is excited to be part of an event that focuses on OSS and will help improve security for all Cloud users:
@wiz_io
Wiz
28 days
Introducing https://t.co/iULfuMrtEd🕵️‍♀️ Be the first to participate in the first-of-its-kind cloud hacking competition. 🤝 WIN PRIZES from our 4.5M$ prize pool. 💰 Register your exploit > https://t.co/pr7GC5uRqu @msftsecresponse @awscloud @googlecloud
3
11
71
@nirohfeld
Nir Ohfeld
28 days
For the first time ever, @awscloud, @msftsecurity, @googlecloud and @wiz_io Research are joining forces to launch https://t.co/ShlGzDWU0O at @BlackHatEvents EU! 🤯 Find critical vulns in open-source cloud software & get paid from our $4.5M prize pool👇 https://t.co/5M95aFAQKh
0
13
54
@wiz_io
Wiz
28 days
Introducing https://t.co/iULfuMrtEd🕵️‍♀️ Be the first to participate in the first-of-its-kind cloud hacking competition. 🤝 WIN PRIZES from our 4.5M$ prize pool. 💰 Register your exploit > https://t.co/pr7GC5uRqu @msftsecresponse @awscloud @googlecloud
2
13
53
@wiz_io
Wiz
1 month
🚨 New CTF challenge just dropped: This one's going to hurt your brain (in the best way) Our researcher @galnagli has created the *trickiest* puzzle yet in our Ultimate Cloud Security Championship. He packed half a dozen advanced bug bounty techniques into one mind-bending
2
13
49
@sagitz_
sagitz
1 month
Fascinating talk by @benny_isaacs and Brakha about their beautiful exploit of a UAF vulnerability in the Redis Lua interpreter at the recent Pwn2Own. A must-watch! 🤩
@hexacon_fr
Hexacon
1 month
📢 From 2-Bit Reset to 0-Click RCE in Redis: A Pwn2Own Edition by Benny Isaacs (@benny_isaacs) & Nir Brakha
0
1
21
@ronenshh
Ronen Shustin
3 months
We (+@nirohfeld) found a critical vulnerability chain in NVIDIA's Triton Inference Server (CVE-2025-23319) that can lead to full Remote Code Execution (RCE). An unauthenticated attacker can remotely take over the server, a cornerstone of many AI/ML production environments. 🧵
2
19
46
@nirohfeld
Nir Ohfeld
3 months
We (+@ronenshh) hacked NVIDIA's Triton AI server by abusing a single error message🚨 The result is unauthenticated RCE allowing attackers to compromise the server and steal proprietary AI models🤯 For more details & mitigations check out our blog @wiz_io https://t.co/v5kpI1eedL
4
61
232
@nirohfeld
Nir Ohfeld
3 months
When we asked @sagitz_ to create a container escape challenge, we honestly didn't believe he'd go this far 😲 The result is a really cool challenge that requires lots of creativity and solid technical skills. Think you got what it takes? 💫 https://t.co/e8V5UZkiVq
0
5
64
@sagitz_
sagitz
3 months
Are you up for a challenge? I authored a container security challenge for the @wiz_io Ultimate Cloud Security Championship 🤩 Put your skills to the test and try it out! 👇 https://t.co/tM7darq7FL
Tweet card summary image
cloudsecuritychampionship.com
Join our monthly cloud security CTF challenge, built by top Wiz researchers. Solve real-world scenarios and rise to the top of the leaderboard.
0
19
53
@wiz_io
Wiz
3 months
🏆 Can you escape a container & become THE ULTIMATE CLOUD SECURITY CHAMPION? This month's scenario was crafted by @sagitz_ to explore container escape techniques, the same kind of risks we'll be diving into at @BlackHatEvents ! Challenge #2 👉 https://t.co/ubsu7JXvpE
0
6
27
@galnagli
Nagli
3 months
I hacked a popular vibe coding platform with a simple, straight-forward logic flaw - allowing access to private applications . Here’s how I did it 🧵
40
241
2K
@wiz_io
Wiz
3 months
🚨 TraderTraitor: North Korea's cyber "traitor" inside the crypto world. This hacking crew hijacks dev workflows, poisons open-source, and compromises cloud environments — all to steal billions in crypto. Here's how they do it 🧵
1
7
18
@nirohfeld
Nir Ohfeld
3 months
We found a new container escape affecting all container runtimes using @NVIDIA GPUs. The crazy part? The exploit is just three lines long 🤯 This is the story of #NVIDIAScape 🧵👇
10
134
642