FuzzingLabs (@fuzzinglabs) 's Twitter Profile
FuzzingLabs

@fuzzinglabs

Research-oriented cybersecurity startup specializing in #fuzzing & vulnerability research on #Rust, Go, AI/LLM, Networking and #blockchain security.

ID: 1300344250752815104

linkhttps://fuzzinglabs.com/ calendar_today31-08-2020 08:07:07

657 Tweet

7,7K Takipçi

3,3K Takip Edilen

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

We already reported 7 vulnerabilities to ollama via huntr 🔥 The first one is CVE-2024-12886, report is now public even if the bug is not fixed yet... Please do not exposed your Ollama server, it is not the only bug we found... 🛡️ huntr.com/bounties/f115f…

We already reported 7 vulnerabilities to <a href="/ollama/">ollama</a> via <a href="/huntr_ai/">huntr</a> 🔥

The first one is CVE-2024-12886, report is now public even if the bug is not fixed yet...

Please do not exposed your Ollama server, it is not the only bug we found... 🛡️

huntr.com/bounties/f115f…
Patrick Ventuzelo (@pat_ventuzelo) 's Twitter Profile Photo

Always a pleasure to welcomed at offensivecon 👌 This week will be intense! - 4 day browser fuzzing training - Conference & talks - Spend time with FuzzingLabs team - Drink beer with friends! - Maybe pwn2own 🔥 Thanks Binary Gecko ! 🙏

Always a pleasure to welcomed at <a href="/offensive_con/">offensivecon</a> 👌

This week will be intense!
- 4 day browser fuzzing training
- Conference &amp; talks
- Spend time with <a href="/FuzzingLabs/">FuzzingLabs</a> team
- Drink beer with friends!
- Maybe pwn2own 🔥

Thanks <a href="/Binary_Gecko/">Binary Gecko</a> ! 🙏
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Boom! Mohand Acherir & Patrick Ventuzelo (@pat_ventuzelo) of FuzzingLabs (@fuzzinglabs) kick off Day Two in style by demonstrating their exploit of #NVIDIA Triton. They're off to the disclosure room to see if their exploit is unique. #Pwn2Own #P2OBerlin

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

We have another bug collision. Mohand Acherir & Patrick Ventuzelo (@pat_ventuzelo) of FuzzingLabs (@fuzzinglabs) exploited #NVIDIA Triton, but the exploit they used was known by the vendor (but unpatched). They still earn $15,000 and 1.5 Master of Pwn points. #Pwn2Own #P2OBerlin

We have another bug collision. Mohand Acherir &amp; Patrick Ventuzelo (@pat_ventuzelo) of FuzzingLabs (@fuzzinglabs) exploited #NVIDIA Triton, but the exploit they used was known by the vendor (but unpatched). They still earn $15,000 and 1.5 Master of Pwn points. #Pwn2Own #P2OBerlin
Fede’s intern 🥊 (@fede_intern) 's Twitter Profile Photo

Our partners and cybersecurity company Fuzzing Labs FuzzingLabs exploited NVIDIA Triton! Incredible work team. The only bad thing is that when they reported the bug NVIDIA already knew about its existence and was working on patching it. Congrats Patrick Ventuzelo, keep up the

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

🔥 First time at #Pwn2Own, first win — and $15,000 later, we’re just getting started. Last week at OffensiveConfessions, we trained, fuzzed, and pwned hard. Here’s the story 👇

🔥 First time at #Pwn2Own, first win — and $15,000 later, we’re just getting started.

Last week at <a href="/OffensiveCon/">OffensiveConfessions</a>, we trained, fuzzed, and pwned hard. Here’s the story 👇
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

In a video highlight from day two of #Pwn2Own Berlin, Mohand Acherir & Patrick Ventuzelo (@pat_ventuzelo) of FuzzingLabs (@fuzzinglabs) exploit the #NVIDIA Triton Inference server youtube.com/shorts/Xuol5l1…

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

🚀 Ready to go beyond static diagrams? This blogpost shares: ✅ Our workflow ✅ AI agents we built ✅ Real output examples ✅ Tips for using LLMs for proactive security 🔗 Read it here: fuzzinglabs.com/ai-threat-mode… 🧠 Built by FuzzingLabs — where automation meets offensive