sagitz_'s profile picture. Cloud Security Researcher at @wiz_io • Microsoft Most Valuable Researcher 21/22/23 • Black Hat Speaker

sagitz

@sagitz_

Cloud Security Researcher at @wiz_io • Microsoft Most Valuable Researcher 21/22/23 • Black Hat Speaker

置頂

We found a Remote Code Execution (RCE) vulnerability in @Ollama - one of the most popular AI inference projects on GitHub. Here is everything you need to know about #Probllama (CVE-2024-37032) 🧵👇

sagitz_'s tweet image. We found a Remote Code Execution (RCE) vulnerability in @Ollama - one of the most popular AI inference projects on GitHub. Here is everything you need to know about #Probllama (CVE-2024-37032) 🧵👇

sagitz 已轉發

🔥 Curious how we exploited CVE-2025-49844 (RediShell)? From a 2-bit reset to 0-click RCE. Come see me at Hexacon 2025 - Paris, where I’ll share in-depth technical details on the exploitation. See you on Friday 👋 #Redis #Security #RediShell @hexacon_fr

benny_isaacs's tweet image. 🔥 Curious how we exploited CVE-2025-49844 (RediShell)? From a 2-bit reset to 0-click RCE.
Come see me at Hexacon 2025 - Paris, where I’ll share in-depth technical details on the exploitation.
See you on Friday 👋
#Redis #Security #RediShell
@hexacon_fr

In case you missed it: $4.5M in bounties (up to $300k per target!) are up for grabs for open source software in the zeroday.cloud competition 🤯 We've partnered with all major cloud providers to offer massive rewards and recognize vulnerability research excellence 🎯

sagitz_'s tweet image. In case you missed it: $4.5M in bounties (up to $300k per target!) are up for grabs for open source software in the zeroday.cloud competition 🤯

We've partnered with all major cloud providers to offer massive rewards and recognize vulnerability research excellence 🎯

sagitz 已轉發

Excited to be a part of #ZeroDayCloud on the floor at Black Hat Europe this year. Let's work together to help secure open-source.

Introducing ZERODAY.CLOUD🕵️‍♀️ Be the first to participate in the first-of-its-kind cloud hacking competition. 🤝 WIN PRIZES from our 4.5M$ prize pool. 💰 Register your exploit > zeroday.cloud @msftsecresponse @awscloud @googlecloud



sagitz 已轉發

Google Cloud is excited to be part of an event that focuses on OSS and will help improve security for all Cloud users:

Introducing ZERODAY.CLOUD🕵️‍♀️ Be the first to participate in the first-of-its-kind cloud hacking competition. 🤝 WIN PRIZES from our 4.5M$ prize pool. 💰 Register your exploit > zeroday.cloud @msftsecresponse @awscloud @googlecloud



sagitz 已轉發

For the first time ever, @awscloud, @msftsecurity, @googlecloud and @wiz_io Research are joining forces to launch zeroday.cloud at @BlackHatEvents EU! 🤯 Find critical vulns in open-source cloud software & get paid from our $4.5M prize pool👇 zeroday.cloud


sagitz 已轉發

Introducing ZERODAY.CLOUD🕵️‍♀️ Be the first to participate in the first-of-its-kind cloud hacking competition. 🤝 WIN PRIZES from our 4.5M$ prize pool. 💰 Register your exploit > zeroday.cloud @msftsecresponse @awscloud @googlecloud


sagitz 已轉發

🚨 New CTF challenge just dropped: This one's going to hurt your brain (in the best way) Our researcher @galnagli has created the *trickiest* puzzle yet in our Ultimate Cloud Security Championship. He packed half a dozen advanced bug bounty techniques into one mind-bending…

wiz_io's tweet image. 🚨 New CTF challenge just dropped: This one's going to hurt your brain (in the best way)

Our researcher @galnagli has created the *trickiest* puzzle yet in our Ultimate Cloud Security Championship. He packed half a dozen advanced bug bounty techniques into one mind-bending…

Fascinating talk by @benny_isaacs and Brakha about their beautiful exploit of a UAF vulnerability in the Redis Lua interpreter at the recent Pwn2Own. A must-watch! 🤩

📢 From 2-Bit Reset to 0-Click RCE in Redis: A Pwn2Own Edition by Benny Isaacs (@benny_isaacs) & Nir Brakha

hexacon_fr's tweet image. 📢 From 2-Bit Reset to 0-Click RCE in Redis: A Pwn2Own Edition by Benny Isaacs (@benny_isaacs) & Nir Brakha


sagitz 已轉發

We (+@nirohfeld) found a critical vulnerability chain in NVIDIA's Triton Inference Server (CVE-2025-23319) that can lead to full Remote Code Execution (RCE). An unauthenticated attacker can remotely take over the server, a cornerstone of many AI/ML production environments. 🧵

ronenshh's tweet image. We (+@nirohfeld) found a critical vulnerability chain in NVIDIA's Triton Inference Server (CVE-2025-23319) that can lead to full Remote Code Execution (RCE).
An unauthenticated attacker can remotely take over the server, a cornerstone of many AI/ML production environments. 🧵

sagitz 已轉發

We (+@ronenshh) hacked NVIDIA's Triton AI server by abusing a single error message🚨 The result is unauthenticated RCE allowing attackers to compromise the server and steal proprietary AI models🤯 For more details & mitigations check out our blog @wiz_io wiz.io/blog/nvidia-tr…

nirohfeld's tweet image. We (+@ronenshh) hacked NVIDIA's Triton AI server by abusing a single error message🚨

The result is unauthenticated RCE allowing attackers to compromise the server and steal proprietary AI models🤯

For more details & mitigations check out our blog @wiz_io wiz.io/blog/nvidia-tr…

sagitz 已轉發

When we asked @sagitz_ to create a container escape challenge, we honestly didn't believe he'd go this far 😲 The result is a really cool challenge that requires lots of creativity and solid technical skills. Think you got what it takes? 💫 cloudsecuritychampionship.com/challenge/2

nirohfeld's tweet image. When we asked @sagitz_  to create a container escape challenge, we honestly didn't believe he'd go this far 😲 

The result is a really cool challenge that requires lots of creativity and solid technical skills.

Think you got what it takes? 💫

cloudsecuritychampionship.com/challenge/2

Are you up for a challenge? I authored a container security challenge for the @wiz_io Ultimate Cloud Security Championship 🤩 Put your skills to the test and try it out! 👇 cloudsecuritychampionship.com/challenge/2


sagitz 已轉發

🏆 Can you escape a container & become THE ULTIMATE CLOUD SECURITY CHAMPION? This month's scenario was crafted by @sagitz_ to explore container escape techniques, the same kind of risks we'll be diving into at @BlackHatEvents ! Challenge #2 👉 cloudsecuritychampionship.com/challenge/2

wiz_io's tweet image. 🏆 Can you escape a container & become THE ULTIMATE CLOUD SECURITY CHAMPION? 

This month's scenario was crafted by @sagitz_ to explore container escape techniques, the same kind of risks we'll be diving into at @BlackHatEvents !  

Challenge #2  👉 cloudsecuritychampionship.com/challenge/2

sagitz 已轉發

I hacked a popular vibe coding platform with a simple, straight-forward logic flaw - allowing access to private applications . Here’s how I did it 🧵

galnagli's tweet image. I hacked a popular vibe coding platform with a simple, straight-forward logic flaw - allowing access to private applications . Here’s how I did it 🧵

sagitz 已轉發

🚨 TraderTraitor: North Korea's cyber "traitor" inside the crypto world. This hacking crew hijacks dev workflows, poisons open-source, and compromises cloud environments — all to steal billions in crypto. Here's how they do it 🧵

wiz_io's tweet image. 🚨 TraderTraitor: North Korea's cyber "traitor" inside the crypto world.  
This hacking crew hijacks dev workflows, poisons open-source, and compromises cloud environments — all to steal billions in crypto.  
Here's how they do it 🧵

sagitz 已轉發

We found a new container escape affecting all container runtimes using @NVIDIA GPUs. The crazy part? The exploit is just three lines long 🤯 This is the story of #NVIDIAScape 🧵👇

nirohfeld's tweet image. We found a new container escape affecting all container runtimes using @NVIDIA GPUs.

The crazy part?
The exploit is just three lines long 🤯

This is the story of #NVIDIAScape 🧵👇

sagitz 已轉發

Something I’m incredibly proud of is finally live. We've launched the Cloud Security Championship: a 12-month series of deep-dive challenges, each crafted by a different top Wiz researcher. The first challenge is up. Go! cloudsecuritychampionship.com


Most points in the AI category at the recent @thezdi Pwn2Own! 🥳

🏆 Wiz Research took 1st place in #Pwn2Own's first-ever AI category, competing against global teams targeting critical AI infrastructure. Huge thanks to our incredible research team! @nirohfeld, @shirtamari, @ronenshh, @benny_isaacs, @sagitz_ & Nir Brakha!

wiz_io's tweet image. 🏆 Wiz Research took 1st place in #Pwn2Own's first-ever AI category, competing against global teams targeting critical AI infrastructure.   

Huge thanks to our incredible research team! @nirohfeld, @shirtamari, @ronenshh, @benny_isaacs, @sagitz_ & Nir Brakha!


sagitz 已轉發

Amazing! Nir Ohfeld (@nirohfeld) Shir Tamari (@shirtamari) of Wiz Research used a External Initialization of Trusted Variables bug to exploit the #NVIDIA Container Toolkit. This unique bug earns them $30,000 and 3 Master of Pwn points.

thezdi's tweet image. Amazing! Nir Ohfeld (@nirohfeld) Shir Tamari (@shirtamari) of Wiz Research used a External Initialization of Trusted Variables bug to exploit the #NVIDIA Container Toolkit. This unique bug earns them $30,000 and 3 Master of Pwn points.
thezdi's tweet image. Amazing! Nir Ohfeld (@nirohfeld) Shir Tamari (@shirtamari) of Wiz Research used a External Initialization of Trusted Variables bug to exploit the #NVIDIA Container Toolkit. This unique bug earns them $30,000 and 3 Master of Pwn points.

sagitz 已轉發

Double whammy! Nir Ohfeld (@nirohfeld) Shir Tamari (@shirtamari) of Wiz Research kick off their Day 3 with an exploit of the NVIDIA Container Toolkit. They weren't confident, the their exploit hit on the first try. Off to the disclosure room with them. #Pwn2Own

thezdi's tweet image. Double whammy! Nir Ohfeld (@nirohfeld) Shir Tamari (@shirtamari) of Wiz Research kick off their Day 3 with an exploit of the NVIDIA Container Toolkit. They weren't confident, the their exploit hit on the first try. Off to the disclosure room with them. #Pwn2Own

Loading...

Something went wrong.


Something went wrong.