FuzzingLabs (@fuzzinglabs) 's Twitter Profile
FuzzingLabs

@fuzzinglabs

Research-oriented cybersecurity startup specializing in #fuzzing & vulnerability research on #Rust, Go, AI/LLM, Networking and #blockchain security.

ID: 1300344250752815104

linkhttps://fuzzinglabs.com/ calendar_today31-08-2020 08:07:07

657 Tweet

7,7K Takipรงi

3,3K Takip Edilen

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

We already reported 7 vulnerabilities to ollama via huntr ๐Ÿ”ฅ The first one is CVE-2024-12886, report is now public even if the bug is not fixed yet... Please do not exposed your Ollama server, it is not the only bug we found... ๐Ÿ›ก๏ธ huntr.com/bounties/f115fโ€ฆ

We already reported 7 vulnerabilities to <a href="/ollama/">ollama</a> via <a href="/huntr_ai/">huntr</a> ๐Ÿ”ฅ

The first one is CVE-2024-12886, report is now public even if the bug is not fixed yet...

Please do not exposed your Ollama server, it is not the only bug we found... ๐Ÿ›ก๏ธ

huntr.com/bounties/f115fโ€ฆ
Patrick Ventuzelo (@pat_ventuzelo) 's Twitter Profile Photo

Always a pleasure to welcomed at offensivecon ๐Ÿ‘Œ This week will be intense! - 4 day browser fuzzing training - Conference & talks - Spend time with FuzzingLabs team - Drink beer with friends! - Maybe pwn2own ๐Ÿ”ฅ Thanks Binary Gecko ! ๐Ÿ™

Always a pleasure to welcomed at <a href="/offensive_con/">offensivecon</a> ๐Ÿ‘Œ

This week will be intense!
- 4 day browser fuzzing training
- Conference &amp; talks
- Spend time with <a href="/FuzzingLabs/">FuzzingLabs</a> team
- Drink beer with friends!
- Maybe pwn2own ๐Ÿ”ฅ

Thanks <a href="/Binary_Gecko/">Binary Gecko</a> ! ๐Ÿ™
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Boom! Mohand Acherir & Patrick Ventuzelo (@pat_ventuzelo) of FuzzingLabs (@fuzzinglabs) kick off Day Two in style by demonstrating their exploit of #NVIDIA Triton. They're off to the disclosure room to see if their exploit is unique. #Pwn2Own #P2OBerlin

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

We have another bug collision. Mohand Acherir & Patrick Ventuzelo (@pat_ventuzelo) of FuzzingLabs (@fuzzinglabs) exploited #NVIDIA Triton, but the exploit they used was known by the vendor (but unpatched). They still earn $15,000 and 1.5 Master of Pwn points. #Pwn2Own #P2OBerlin

We have another bug collision. Mohand Acherir &amp; Patrick Ventuzelo (@pat_ventuzelo) of FuzzingLabs (@fuzzinglabs) exploited #NVIDIA Triton, but the exploit they used was known by the vendor (but unpatched). They still earn $15,000 and 1.5 Master of Pwn points. #Pwn2Own #P2OBerlin
Fedeโ€™s intern ๐ŸฅŠ (@fede_intern) 's Twitter Profile Photo

Our partners and cybersecurity company Fuzzing Labs FuzzingLabs exploited NVIDIA Triton! Incredible work team. The only bad thing is that when they reported the bug NVIDIA already knew about its existence and was working on patching it. Congrats Patrick Ventuzelo, keep up the

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

๐Ÿ”ฅ First time at #Pwn2Own, first win โ€” and $15,000 later, weโ€™re just getting started. Last week at OffensiveConfessions, we trained, fuzzed, and pwned hard. Hereโ€™s the story ๐Ÿ‘‡

๐Ÿ”ฅ First time at #Pwn2Own, first win โ€” and $15,000 later, weโ€™re just getting started.

Last week at <a href="/OffensiveCon/">OffensiveConfessions</a>, we trained, fuzzed, and pwned hard. Hereโ€™s the story ๐Ÿ‘‡
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

In a video highlight from day two of #Pwn2Own Berlin, Mohand Acherir & Patrick Ventuzelo (@pat_ventuzelo) of FuzzingLabs (@fuzzinglabs) exploit the #NVIDIA Triton Inference server youtube.com/shorts/Xuol5l1โ€ฆ

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

๐Ÿš€ Ready to go beyond static diagrams? This blogpost shares: โœ… Our workflow โœ… AI agents we built โœ… Real output examples โœ… Tips for using LLMs for proactive security ๐Ÿ”— Read it here: fuzzinglabs.com/ai-threat-modeโ€ฆ ๐Ÿง  Built by FuzzingLabs โ€” where automation meets offensive