wtm@offensi.com (@wtm_offensi) 's Twitter Profile
[email protected]

@wtm_offensi

Security researcher, bug bounty hunter, employee of the month & owner at Offensi

ID: 880716657576079361

linkhttps://offensi.com calendar_today30-06-2017 09:16:28

915 Tweet

2,2K Followers

1,1K Following

Nir Ohfeld (@nirohfeld) 's Twitter Profile Photo

We (+Ronen Shustin) hacked NVIDIA's Triton AI server by abusing a single error message🚨 The result is unauthenticated RCE allowing attackers to compromise the server and steal proprietary AI models🤯 For more details & mitigations check out our blog Wiz wiz.io/blog/nvidia-tr…

We (+<a href="/ronenshh/">Ronen Shustin</a>) hacked NVIDIA's Triton AI server by abusing a single error message🚨

The result is unauthenticated RCE allowing attackers to compromise the server and steal proprietary AI models🤯

For more details &amp; mitigations check out our blog <a href="/wiz_io/">Wiz</a> wiz.io/blog/nvidia-tr…
Tom Gallagher (@secbughunter) 's Twitter Profile Photo

The MSRC team and I are excited up to connect and learn from security researchers and the community at Black Hat & DEF CON this week! If you spot me, I might have a shirt with your name on it. #blackhat2025 #blackhat #defcon Microsoft Security Response Center

The MSRC team and I are excited up to connect and learn from security researchers and the community at Black Hat &amp; DEF CON this week! If you spot me, I might have a shirt with your name on it. #blackhat2025 #blackhat #defcon <a href="/msftsecresponse/">Microsoft Security Response Center</a>
Security Response (@msftsecresponse) 's Twitter Profile Photo

Thank you to everyone who joined us at the MSRC Researcher Celebration during #BHUSA last night. It was incredible to see so many members of the security community come together to share stories and build connections. Special shoutout to our 2025 MSRC MVRs for being part of this

Thank you to everyone who joined us at the MSRC Researcher Celebration during #BHUSA last night. It was incredible to see so many members of the security community come together to share stories and build connections. Special shoutout to our 2025 MSRC MVRs for being part of this
Google VRP (Google Bug Hunters) (@googlevrp) 's Twitter Profile Photo

šŸ“¢ Exciting News! ESCAL8 and init.g() 2025 are heading to Mexico City this October! šŸ‡²šŸ‡½ Find out more about the learning, knowledge sharing, and hacking activities at ESCAL8, and join us for a recap of ESCAL8 2024. bughunters.google.com/blog/482563727…

Google VRP (Google Bug Hunters) (@googlevrp) 's Twitter Profile Photo

Heads up for Cloud bug hunters ā˜ļø! From Oct 1, the Cloud VRP is updating its reward structure based on your feedback, including more specific reward categories, fixed reward amounts, and much more! For a full overview šŸ‘‡ bughunters.google.com/blog/617188814…

skull (@brutecat) 's Twitter Profile Photo

Wrapping up an amazing time at Google #bugSWAT Mexico 2025. It was a privilege meeting so many brilliant people including Ezequiel Pereira, Sreeram KL, Sivanesh Ashok and more. Thrilled that my report was featured in init.g and used to inspire students. That's truly rewarding.

Wrapping up an amazing time at Google #bugSWAT Mexico 2025. It was a privilege meeting so many brilliant people including <a href="/epereiralopez/">Ezequiel Pereira</a>, <a href="/kl_sree/">Sreeram KL</a>, <a href="/sivaneshashok/">Sivanesh Ashok</a> and more. 

Thrilled that my report was featured in init.g and used to inspire students. That's truly rewarding.
Jun Kokatsu (@shhnjk) 's Twitter Profile Photo

This finally launched! Rewarding (indirect) prompt injection issues which demonstrate security impact is tricky. We decided to go with rogue actions and exfiltration (i.e. focusing on exploitation instead of prompt injection). Looking forward to creative bugs!!

David Weston (DWIZZZLE) (@dwizzzlemsft) 's Twitter Profile Photo

Microsoft just open sourced a Rust implementation of UEFI boot firmware called "Patina" this is a MASSIVE step forward in improving boot security for all. Exciting!!! github.com/openDevicePart…

wtm@offensi.com (@wtm_offensi) 's Twitter Profile Photo

Some unfinished research by Callum and me that was finally finished and submitted. Thank you Kristian & Grafana ! This was truly patched and rewarded with the speed of light. cve.org/cverecord?id=C…

0xor0ne (@0xor0ne) 's Twitter Profile Photo

We’re hiring offensive security researchers Apple SEAR! We’re looking for skilled researchers across multiple security domains. Learn more and apply here: jobs.apple.com/en-us/details/… If you’re into low level systems like firmware, RTOS, coprocessors, embedded components, or

Nir Ohfeld (@nirohfeld) 's Twitter Profile Photo

Only 14 days left to submit your exploit to ZeroDay Cloud! āŒ›ļø We have also set up a Slack community for researchers who plan to participate or simply attend the event - DM me for the invite link Good luck to all participants!

Only 14 days left to submit your exploit to ZeroDay Cloud! āŒ›ļø

We have also set up a Slack community for researchers who plan to participate or simply attend the event - DM me for the invite link

Good luck to all participants!
Nir Ohfeld (@nirohfeld) 's Twitter Profile Photo

Only 3 days left to submit your exploits to ZeroDay Cloud! ā³ We are blown away by the submissions we've received so far. Curious to see which other targets get popped in the final stretch... šŸ‘€

Only 3 days left to submit your exploits to ZeroDay Cloud! ā³

We are blown away by the submissions we've received so far. Curious to see which other targets get popped in the final stretch... šŸ‘€