wiz_io Profile Banner
Wiz Profile
Wiz

@wiz_io

Followers
19K
Following
2K
Media
681
Statuses
2K

Secure everything you build and run in the cloud

Global 🌎
Joined June 2020
Don't wanna be here? Send us removal request.
@wiz_io
Wiz
8 hours
🎄 The Wizmoji holiday pack is here! 🎄 Your Slack & WhatsApp just got way more festive… and a little more secure. Some favorites: - santa-oncall, - 0-day-before-xmas, - grinch-stole-data https://t.co/Hez397bdaW
1
1
5
@wiz_io
Wiz
4 days
🚨 Heads up: A stolen GitHub PAT can open your cloud. Attackers don't need skill, just patience - one NPM supply-chain hit is enough. Our IR team shows how PATs are abused to pivot from code ➝ cloud ⬇️ https://t.co/513hx2nIls
1
7
29
@FannieMae
Fannie Mae
3 months
Quickly and easily evaluate borrowers' income with our award-winning Income Calculator. Let our technology work harder for you, so you can do great work for your borrowers. Learn more.
15
31
541
@0xdabbad00
Scott Piper
5 days
An interesting update to Wiz's react2shell article has been made by Gili Tikochinski who investigated an advance in the attacks where a fileless backdoor is now being used. See the section "Fileless Backdoor". https://t.co/FzysVXNU80
0
14
44
@wiz_io
Wiz
5 days
📣 Wiz real-time CSPM is now GA. Misconfigurations are the #1 cloud risk. Now you can stop them instantly. Detect issues the moment they’re created, with 3,400+ rules and graph-based context to focus only on what matters. https://t.co/WuITPTmjeK
0
3
11
@adnanthekhan
Adnan Khan
12 days
Great to see this article from Wiz. Those in the SSC space have been sounding the alarm on just how bad PAT compromise could get for years, but real world cases mean the threat is real and not just "Oh, only security researchers do this." I hope more victims of GitHub PAT-based
Tweet card summary image
wiz.io
Wiz CIRT reveals how compromised GitHub PATs enable secret theft, malicious workflows, and cross-cloud lateral movement. See the full attack flow and defenses.
10
7
25
@wiz_io
Wiz
7 days
🎙️ AI is changing cyber rules, are you keeping up? Eden chats with Ryan Nolette, John Miller, & @41thexplorer on AI threats, cloud defense & the future of security 👇 🍏 https://t.co/ENwTwfIyDQ
2
0
4
@wiz_io
Wiz
10 days
Our CTF Winners Team: operationcrownfall! @cr0wn, @ZetaTwo, @mr_nankeencr0wn dominated our on-site CTF, winning both Best Overall and Best in the Cloud & Web track. In a last minute hacking session, they shut down Egor - the evil AI Robot - and won a total of $15,000!
0
3
18
@wiz_io
Wiz
10 days
@emil_lerner hit Redis with a crafty exploit chain that got him RCE and $30,000. Deep understanding, smart exploitation, and another strong Redis win.
1
1
14
@wiz_io
Wiz
10 days
Team Skateboarding Dog (Joseph Surin, John Stephenson, and @ThatEquus): @ThatEquus from Team Skateboarding Dog went on stage and within a minute popped a shell on Redis, winning her team $30K. They also won the unofficial best exploit art reward, netting them an additional $0!
1
0
12
@wiz_io
Wiz
10 days
Yoni Sherez had the privilege of going on stage first, along with the jitters that came with it. He kept his cool and within seconds exploited a post-auth RCE on Redis - winning him $30,000!
1
1
12
@wiz_io
Wiz
10 days
Team CCC (@u1f383 & @farazsth98): Team CCC dropped a Linux Kernel 0-day vulnerability that won them 3rd place (tied) and $40,000. Clean exploit, big win, and stronger Linux security.
2
3
61
@wiz_io
Wiz
10 days
Team Bugz Bunnies (@stdoutput & @pspaul95): Team Bugz Bunnies delivered twice, getting RCEs on Grafana & PostgreSQL, grabbing a total of $40,000 and winning 3rd place!
1
1
14
@wiz_io
Wiz
10 days
Daniel Firer uncovered powerful post-auth RCEs in both Postgres and Redis, winning him the second place and a total $60,000! The smile says it all:
1
0
17
@wiz_io
Wiz
10 days
Our CHAMPIONS - Team XINT Code (@tjbecker)! Team XINT Code went AI-first. With 0 human intervention, their tool found critical 0-day RCEs in Redis, PostgreSQL, and MariaDB - sweeping the DB category and winning them $90K. They also grabbed $5K winning our CTF.
2
6
32
@wiz_io
Wiz
10 days
https://t.co/iULfuMs1tL WINNERS THREAD 🧵
1
5
60
@wiz_io
Wiz
11 days
https://t.co/pr7GC5uRqu 2025?… UNREAL. 2 days. $340k in prizes 🤑 Live exploits on stage that literally shook the room. THANK YOU to everyone who came! You made history. You made the cloud safer.
0
6
40
@wiz_io
Wiz
11 days
Do you know what IPoAC stands for? 🔤 @AmitaiCo asked hackers after 36hrs sleep deprivation: to explain these acronyms. The results? Pure FUN. 💣
0
4
23
@wiz_io
Wiz
11 days
Final day at https://t.co/pr7GC5uRqu was W1LD.🧑‍💻 Today’s successful exploits >> RCEs in Redis (x2), PostgreSQL, and MariaDB - all demonstrated live on stage. Congrats to XINT Code for being the https://t.co/pr7GC5uRqu CHAMPIONS!
4
12
95
@wiz_io
Wiz
11 days
⚠️ Gogs 0-day (CVE-2025-8110) is being exploited in the wild. Wiz Research confirms 700+ compromised servers. Patch pending - lock down your Gogs instances. https://t.co/Ha2v5mbH10
Tweet card summary image
wiz.io
Wiz Research discovered a Gogs zero-day (CVE-2025-8110) that bypasses a previous RCE fix via symlinks, leading to file overwrite and remote code execution.
0
12
50