thezdi Profile Banner
Trend Zero Day Initiative Profile
Trend Zero Day Initiative

@thezdi

Followers
84K
Following
157
Media
1K
Statuses
4K

Trend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.

Austin, Texas
Joined November 2009
Don't wanna be here? Send us removal request.
@thezdi
Trend Zero Day Initiative
23 days
Miss any of #Pwn2Own Ireland 2025? You can watch all of the video - attempts and recaps - at
Tweet card summary image
youtube.com
Videos related to the 2025 edition of the Pwn2Own Ireland competition
0
3
17
@TheZDIBugs
TheZDIBugs
2 days
[ZDI-25-1013|CVE-2025-33186] NVIDIA AIStore AuthN Hard-coded Credentials Authentication Bypass Vulnerability (CVSS 9.8; Credit: Peter Girnus (@gothburz) of Trend Zero Day Initiative)
Tweet card summary image
zerodayinitiative.com
NVIDIA AIStore AuthN Hard-coded Credentials Authentication Bypass Vulnerability
0
1
6
@POC_Crew
POC_Crew
4 days
Huge thanks for the keynote 💙 It was fantastic. Brian Gorenc (@MaliciousInput) – From Buffer Overflows to Breaking AI: Two Decades of ZDI Vulnerability Research 🎤 #POC2025
0
6
52
@thezdi
Trend Zero Day Initiative
5 days
No time to read the patch blog and just want the highlights? Check out the Patch Report for November. @dustin_childs covers what you need to know and what to look out for.
0
3
5
@thezdi
Trend Zero Day Initiative
5 days
It's a small release from #Microsoft and #Adobe, but there's one CVE in the wild and plently to discuss - including silent patches from October. @dustin_childs has his full roundup at
zerodayinitiative.com
I’ve made it through Pwn2Own Ireland , and while many are celebrated those who served their country in the armed services, patch Tuesday stops for no one. So affix your poppy accordingly, and let’s...
0
4
12
@TheZDIBugs
TheZDIBugs
20 days
[ZDI-25-965|CVE-2025-61677] DataChain data_storage Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVSS 8.8; Credit: Peter Girnus (@gothburz) of Trend Zero Day Initiative)
Tweet card summary image
zerodayinitiative.com
DataChain data_storage Deserialization of Untrusted Data Remote Code Execution Vulnerability
1
2
11
@thezdi
Trend Zero Day Initiative
23 days
Wrapping up #Pwn2Own Ireland 2025. The three day event saw some amazing exploits and traumatic failures. We laughed, we cried, we shouted. Check out the highlights and see who won Master of Pwn. #P2OIreland https://t.co/WW45Lkzj3d
1
8
34
@thezdi
Trend Zero Day Initiative
23 days
What was bug if the day for #Pwn2Own Ireland day 3? Check it out
0
4
17
@thezdi
Trend Zero Day Initiative
23 days
$1,024,750 - 73 unique bugs - a week of amazing research on display. #Pwn2Own Ireland had it all. Success. Failure. Intrigue. You name it. Congratulations to the Master of Pwn winners @SummoningTeam! Their outstanding work earned them $187,500 and 22 point. See you in Tokyo for
0
13
148
@thezdi
Trend Zero Day Initiative
24 days
26
45
426
@thezdi
Trend Zero Day Initiative
24 days
Unfortunately, Frisk and Opcode from the Inequation Group ctf team could not get their exploit of the Meta Quest 3S working within the time time allotted. They were able to cause a DoS, but did not achieve code execution. #Pwn2Own
1
1
11
@thezdi
Trend Zero Day Initiative
24 days
We have another collision! Bongeun Koo (@kiddo_pwn) and Evangelos Daravigkas (@freddo_1337) of Team DDOS used a single bug to exploit the QNAP TS-453E, but the bug has been previously seen in the contest. Their work still earns them $10,000 and 2 Master of Pwn points. #Pwn2Own
2
4
20
@thezdi
Trend Zero Day Initiative
24 days
Confirmed! namnp of Viettel Cyber Security used a crypto bypass and a heap overflow to exploit the Phillips Hue Bridge. They earn $20,000 and 4 Master of Pwn points, which catapults them in the Top 5. It also puts us over $1,000,000 for the contest! #Pwn2Own
0
2
32
@thezdi
Trend Zero Day Initiative
24 days
Boom! One their second attempt, the Viettel Cyber Security successfully got a root shell on the Philips Hue Bridge. They head off to the disclosure room one last time to provide the details. #Pwn2Own
0
0
11
@thezdi
Trend Zero Day Initiative
24 days
We have another collision. Evan Grant (@stargravy) used a single bug to exploit the QNAP TS-453E, but, unfortunately, it had been used earlier in the contest. He still earns $10,000 and 2 Master of Pwn points. #Pwn2Own
0
1
6
@thezdi
Trend Zero Day Initiative
24 days
Boom! Bongeun Koo (@kiddo_pwn) and Evangelos Daravigkas (@freddo_1337) of Team DDOS completed their exploit of the QNAP TS-453E NAS device. They are off to the disclosure room to provide details. #Pwn2Own
0
3
9
@thezdi
Trend Zero Day Initiative
24 days
Another collision: the Thalium team from Thales Group (@thalium_team) needed 3 bugs to exploit the Phillips Hue Bridge, but only their heap based buffer overflow was unique. The others were seen earlier in the contest. They still earn $13,500 and 2.75 Master of Pwn points.
0
2
19
@thezdi
Trend Zero Day Initiative
24 days
Confirmed (with style!) - Interrupt Labs combined a path traversal and an untrusted search path bug to exploit the Lexmark CX532adwe. They got a reverse shell and loaded Doom on the LCD. We couldn't play it though :-[ Still awesome to see. #Pwn2Own
2
6
53