Q5Ca (@_q5ca) 's Twitter Profile
Q5Ca

@_q5ca

Chief Remote Work Officer at @u0Kplusplus

ID: 932190929020006401

linkhttps://duongq5ca.substack.com/ calendar_today19-11-2017 10:16:51

217 Tweet

782 Followers

349 Following

Nguyen The Duc (@ducnt_) 's Twitter Profile Photo

Hi folks, So, anyone has any idea how to make direct contact with the CTFTime team (maybe they’re on holiday) ? Our TetCTF2023 will start in the next 9-10 days but the CTF event is still not listed on CTFTime :'(. (1/2)

Hi folks,
So, anyone has any idea how to make direct contact with the CTFTime team (maybe they’re on holiday) ? Our TetCTF2023 will start in the next 9-10 days but the CTF event is still not listed on CTFTime :'(. (1/2)
pashov (@pashovkrum) 's Twitter Profile Photo

This might be the best compilation of critical issues/exploits from 2022, with explanations. If you want to do good as an auditor make sure you understand how those attacks work. Thanks patrickd this is golden🫡 ventral.digital/posts/2022/12/…

SunSec (@1nf0s3cpt) 's Twitter Profile Photo

Good works 👍 BlockSec successfully blocked an attack to rescue 2,906 ETH. etherscan.io/tx/0xe3f0d14cf… Then the attacker left a message: etherscan.io/tx/0x8eb65ef10…

Good works 👍

<a href="/BlockSecTeam/">BlockSec</a> successfully blocked an attack to rescue 2,906 ETH.
etherscan.io/tx/0xe3f0d14cf…

Then the attacker left a message: etherscan.io/tx/0x8eb65ef10…
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Success! Janggggg of starlabs was able to execute a 2-bug chain on Microsoft SharePoint. They earn $100,000 and 10 Master of Pwn points. #Pwn2Own #P2OVancouver

Success! <a href="/testanull/">Janggggg</a> of <a href="/starlabs_sg/">starlabs</a> was able to execute a 2-bug chain on Microsoft SharePoint. They earn $100,000 and 10 Master of Pwn points. #Pwn2Own #P2OVancouver
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Success! dungdm (piers) of Team Viettel (VCSLab) used an uninitialized variable and a UAF bug to exploit Oracle VirtualBox. They earn $40,000 and 4 Master of Pwn points. #Pwn2Own #P2OVancouver

Success! dungdm (<a href="/_piers2/">piers</a>) of Team Viettel (<a href="/vcslab/">VCSLab</a>) used an uninitialized variable and a UAF bug to exploit Oracle VirtualBox. They earn $40,000 and 4 Master of Pwn points. #Pwn2Own #P2OVancouver
LLM Security (@llm_sec) 's Twitter Profile Photo

* People ask LLMs to write code * LLMs recommend imports that don't actually exist * Attackers work out what these imports' names are, and create & upload them with malicious payloads * People using LLM-written code then auto-add malware themselves vulcan.io/blog/ai-halluc…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

That's a wrap on #Pwn2Own Toronto 2023! We awarded $1,038,250 for 58 unique 0-days during the event. Congratulations to Team Viettel (VCSLab) for winning Master of Pwn with $180K and 30 points. We'll see you at Pwn2Own Automotive in Tokyo next January.

That's a wrap on #Pwn2Own Toronto 2023! We awarded $1,038,250 for 58 unique 0-days during the event. Congratulations to Team Viettel (<a href="/vcslab/">VCSLab</a>) for winning Master of Pwn with $180K and 30 points. We'll see you at Pwn2Own Automotive in Tokyo next January.
Q5Ca (@_q5ca) 's Twitter Profile Photo

Just a quick reminder: Copilot on microsoft365.com (m365.cloud.microsoft/chat) is not on scope for bounty 🥲 duongq5ca.substack.com/p/another-micr…

Just a quick reminder: Copilot on microsoft365.com (m365.cloud.microsoft/chat) is not on scope for bounty 🥲

duongq5ca.substack.com/p/another-micr…