Zero Day InitiativeOvjeren akaunt

@thezdi

Trend Micro’s Zero Day Initiative (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.

Austin, Texas
Vrijeme pridruživanja: studeni 2009.

Tweetovi

Blokirali ste korisnika/cu @thezdi

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @thezdi

  1. Prikvačeni tweet

    We're excited to announce Vancouver 2020 with new categories and returning partners, & along with sponsor . More than $1,000,000 USD available - plus a Model 3! Details at

    Poništi
  2. Taking a look at what we published in 2019. What was the most popular vendor? The most common ? All this and more in our 2019 retrospective.

    Poništi
  3. For complete details on the results Miami and links to all the videos, check out our blog at

    Poništi
  4. The first-ever Pwn2Own Miami has come to a close. Watch to see the final day of ICS exploitation, hear from the contestants themselves, and learn who was crowned Master of Pwn.

    Poništi
  5. The final count is in, and with 92.5 points total, and are crowned Master of Pwn! Congratulations to everyone who participated. We'll have a full wrap video with all the results available tomorrow morning. We'll see you in Vancouver.

    Poništi
  6. We have confirmed the bug used by Lucas had been previously reported. This counts as a partial win. He earns 12.5 points toward Master of Pwn.

    Poništi
  7. Lucas sends us off in style. He was able to demonstrate his RCE in the Rockwell Automation FactoryTalk View SE with no difficulties. We're headed back to the disclosure room one last time for Miami 2020.

    Poništi
  8. Congrats to Inductive Automation for addressing the RCEs reported through Miami. The fixes are in the early access builds and is already referenced in their change logs. The fixes will also be available in 8.0.8.

    Poništi
  9. We're wrapping up Miami with one last attempt. Lucas Georges of Synacktiv () targets the Rockwell Automation FactoryTalk View SE with an RCE.

    Poništi
  10. Poništi
  11. We have confirmed the last entry from used a bug that had been previously reported. This counts as a partial win. He earns 12.5 points towards Master of Pwn.

    Poništi
  12. Success! The late afternoon didn't get to . He wasted no time in demonstrating his RCE in the Inductive Automation Ignition. He's off to the disclosure room to spill the deets.

    Poništi
  13. With the penultimate attempt of the Miami contest, of Oak Ridge National Laboratory targets a remote code execution with continuation against the Inductive Automation Ignition in the Control Server category.

    Poništi
  14. Confirmed! , , and used a couple of bugs to get code execution on the Triangle Microworks SCADA Data Gateway. They earn $25,000 and 25 Master of Pwn points. That puts them in 2nd place with 87.5 total.

    Poništi
  15. Confirmed! The Research team used a combination of bugs to get code execution with continuation on the Rockwell Automation FactoryTalk View SE. They earn another $25,000 and 25 Master of Pwn points.

    Poništi
  16. Success! The team of , , and needed little time to demo their RCE against the Triangle Microworks SCADA Data Gateway in the DNP3 category. They're off to the disclosure room with all the details.

    Poništi
  17. Coming up at 2pm, , , and will be targeting a remote code execution with continuation against the Triangle Microworks SCADA Data Gateway in the DNP3 category. This could be the most exciting demo of the contest.

    Poništi
  18. Didn't find a glow in the dark coin yesterday? You'll have another chance today at 3 ET in our trivia challenge. Check back for a chance to win!

    Poništi
  19. Success! The team was able to gain code execution with continuation on the Rockwell Automation FactoryTalk View SE. Off to the disclosure room to verify!

    Poništi
  20. Returning to the stage, the team will be targeting a remote execution with continuation against the Rockwell Automation FactoryTalk View SE in the HMI category.

    Poništi
  21. Confirmed! and used a deserialization bug to get code execution (w/ continuation) on the Iconics Genesis64. That's another $25K and 25 Master of Pwn points. That puts them in a commanding lead for Master of Pwn.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·