QNAP Canada(@QNAPCanada) 's Twitter Profile Photo

Exciting update from ! We're boosting our product security through a partnership with Zero Day Initiative ( ). Fresh from our participation in Pwn2Own Toronto 2023, we're advancing data protection for users worldwide. 🌍💻

Exciting update from #QNAP! We're boosting our product security through a partnership with Zero Day Initiative (#ZDI). Fresh from our participation in Pwn2Own Toronto 2023, we're advancing data protection for users worldwide. 🌍💻 #Cybersecurity #DataProtection #TechInnovation
account_circle
ocdsec(@0xocdsec) 's Twitter Profile Photo

There are some scenes from CanSecWest and at ~ 9 minutes in the vid
there is an interview like
'During the pwn2own some private companies come to us and ... no comment' 😂

The Flaws that Allow Hackers to Remotely Access Cars youtu.be/mp0SA6tECdg via YouTube

account_circle
exploits.club(@exploitsclub) 's Twitter Profile Photo

SPECIAL EDITION NEWSLETTER JUST DROPPED👇👇

Pwn2Own Winner Manfred Paul agreed to answer a handful of questions for this weeks newsletter

Check it out here 🏴‍☠️
blog.exploits.club/exploits-club-…

Regular recaps and job postings resuming next week

account_circle
Zero Day Initiative(@thezdi) 's Twitter Profile Photo

In a new guest blog, Cody Gallagher describes the bug he used to exploit at Vancouver. He gives an in-depth analysis of how he used a race condition to win $20,000 at the contest.
zerodayinitiative.com/blog/2024/5/9/…

account_circle
h0mbre(@h0mbre_) 's Twitter Profile Photo

sure, the Pwn2Own people are all high-level CTF players, but can they wear a polo and do Microsoft Teams?

account_circle
Neil Mitchell-Hunter(@polo_nmh) 's Twitter Profile Photo

In this guest blog from Master of Pwn winner Manfred Paul, he details CVE-2024-2887 - a type of confusion bug that occurs in both Google Chrome and Microsoft Edge (Chromium).

Learn more from Trend Micro's Zero Day Initiative: bit.ly/44u0J2b

account_circle
Alex Plaskett(@alexjplaskett) 's Twitter Profile Photo

Talking of directory traversal bugs, whats you favorite?

I had some fun back in the Android days chaining it together with multiple other logic bugs in an epub application to achieve RCE on a Huawei device:

github.com/alexplaskett/P…

account_circle
Zero Day Initiative(@thezdi) 's Twitter Profile Photo

In a new guest blog, winner Manfred Paul details CVE-2024-2887 - a bug he used to exploit both and during the contest on his way to winning Master of Pwn. He breaks down the root cause and shows how he exploited it. Read the details at zerodayinitiative.com/blog/2024/5/2/…

account_circle
TheZDIBugs(@TheZDIBugs) 's Twitter Profile Photo

[ZDI-24-419|CVE-2024-4406] (Pwn2Own) Xiaomi Pro 13 GetApps integral-dialog-page Cross-Site Scripting Remote Code Execution Vulnerability (CVSS 8.8; Credit: Ken Gannon and Ilyes Beghdadi of NCC Group) zerodayinitiative.com/advisories/ZDI…

account_circle
Sandro Bruscino(@SandroBruscino) 's Twitter Profile Photo

🔥 Breaking down CVE-2024-2887: Discover the Pwn2Own winning bug in Google Chrome! Dive into the technical details and implications of this vulnerability. bit.ly/4biRzYU

account_circle
TheZDIBugs(@TheZDIBugs) 's Twitter Profile Photo

[ZDI-24-418|CVE-2024-4405] (Pwn2Own) Xiaomi Pro 13 mimarket manual-upgrade Cross-Site Scripting Remote Code Execution Vulnerability (CVSS 8.8; Credit: Nguyen Xuan Hoang, vudq16, Nguyễn Đình Biển, Q5Ca from VCSLab) zerodayinitiative.com/advisories/ZDI…

account_circle
Geeknik's {{☀️}} Lab(@geeknik) 's Twitter Profile Photo

In a digital comedy of errors, Manfred Paul tickled the silicon underbelly of Chrome and Edge, turning type confusion into an art form—until the patch police crashed his cyber party.

zerodayinitiative.com/blog/2024/5/2/…

account_circle
Philippe Ternission(@hfrancelesite) 's Twitter Profile Photo

Pwn2Own Miami 2022 de Zero Day Initiative – Steven Seeley et Chris Anastasio &# … hfrance.fr/pwn2own-miami-…

account_circle
Israel(@f1tym1) 's Twitter Profile Photo

CVE-2024-21115: An Oracle VirtualBox LPE Used to Win Pwn2Own ift.tt/7JlkCuT
In this guest blog from Master of Pwn winner Cody Gallagher, he details CVE-2024-21115 – an Out-of-Bounds (OOB) Write that occurs in Oracle VirtualBox that can be leveraged for privilege escal…

account_circle
Mr. Anthony 安東尼(@darkfloyd1014) 's Twitter Profile Photo

(LinkedIn) In a new guest blog, winner Manfred Paul details CVE-2024-2887 - a bug he used to exploit both and during the contest on his way to winning Master of Pwn. He breaks down the root cause and shows how he exploited it. Read the details at…

account_circle