Trend Zero Day Initiative
@thezdi
Followers
84K
Following
157
Media
1K
Statuses
4K
Trend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
Austin, Texas
Joined November 2009
Miss any of #Pwn2Own Ireland 2025? You can watch all of the video - attempts and recaps - at
youtube.com
Videos related to the 2025 edition of the Pwn2Own Ireland competition
0
3
17
[ZDI-25-1013|CVE-2025-33186] NVIDIA AIStore AuthN Hard-coded Credentials Authentication Bypass Vulnerability (CVSS 9.8; Credit: Peter Girnus (@gothburz) of Trend Zero Day Initiative)
zerodayinitiative.com
NVIDIA AIStore AuthN Hard-coded Credentials Authentication Bypass Vulnerability
0
1
6
Huge thanks for the keynote 💙 It was fantastic. Brian Gorenc (@MaliciousInput) – From Buffer Overflows to Breaking AI: Two Decades of ZDI Vulnerability Research 🎤 #POC2025
0
6
52
No time to read the patch blog and just want the highlights? Check out the Patch Report for November. @dustin_childs covers what you need to know and what to look out for.
0
3
5
It's a small release from #Microsoft and #Adobe, but there's one CVE in the wild and plently to discuss - including silent patches from October. @dustin_childs has his full roundup at
zerodayinitiative.com
I’ve made it through Pwn2Own Ireland , and while many are celebrated those who served their country in the armed services, patch Tuesday stops for no one. So affix your poppy accordingly, and let’s...
0
4
12
[ZDI-25-965|CVE-2025-61677] DataChain data_storage Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVSS 8.8; Credit: Peter Girnus (@gothburz) of Trend Zero Day Initiative)
zerodayinitiative.com
DataChain data_storage Deserialization of Untrusted Data Remote Code Execution Vulnerability
1
2
11
Wrapping up #Pwn2Own Ireland 2025. The three day event saw some amazing exploits and traumatic failures. We laughed, we cried, we shouted. Check out the highlights and see who won Master of Pwn. #P2OIreland
https://t.co/WW45Lkzj3d
1
8
34
$1,024,750 - 73 unique bugs - a week of amazing research on display. #Pwn2Own Ireland had it all. Success. Failure. Intrigue. You name it. Congratulations to the Master of Pwn winners @SummoningTeam! Their outstanding work earned them $187,500 and 22 point. See you in Tokyo for
0
13
148
We have another collision! Bongeun Koo (@kiddo_pwn) and Evangelos Daravigkas (@freddo_1337) of Team DDOS used a single bug to exploit the QNAP TS-453E, but the bug has been previously seen in the contest. Their work still earns them $10,000 and 2 Master of Pwn points. #Pwn2Own
2
4
20
Confirmed! namnp of Viettel Cyber Security used a crypto bypass and a heap overflow to exploit the Phillips Hue Bridge. They earn $20,000 and 4 Master of Pwn points, which catapults them in the Top 5. It also puts us over $1,000,000 for the contest! #Pwn2Own
0
2
32
We have another collision. Evan Grant (@stargravy) used a single bug to exploit the QNAP TS-453E, but, unfortunately, it had been used earlier in the contest. He still earns $10,000 and 2 Master of Pwn points. #Pwn2Own
0
1
6
Boom! Bongeun Koo (@kiddo_pwn) and Evangelos Daravigkas (@freddo_1337) of Team DDOS completed their exploit of the QNAP TS-453E NAS device. They are off to the disclosure room to provide details. #Pwn2Own
0
3
9
Another collision: the Thalium team from Thales Group (@thalium_team) needed 3 bugs to exploit the Phillips Hue Bridge, but only their heap based buffer overflow was unique. The others were seen earlier in the contest. They still earn $13,500 and 2.75 Master of Pwn points.
0
2
19