Heading to the [un]prompted conference next week? Be sure to catch Peter Girnus' talk on "FENRIR: AI Hunting for AI Zero-Days at Scale." His talk shows how we're FENRIR has detected over 100+ CVEs since mid-2025. Don't miss it. https://unpromptedcon.org/
TrendAI Zero Day Initiative
Computer and Network Security
Austin, Texas 8,258 followers
Founded in 2005 - TrendAI Zero Day Initiative™ (ZDI) is the world's largest vendor-agnostic bug bounty program.
About us
Trend Micro's Zero Day Initiative (ZDI) was created to encourage the reporting of 0-day vulnerabilities privately to the affected vendors by financially rewarding researchers. At the time, there was a perception by some in the information security industry that those who find vulnerabilities are malicious hackers looking to do harm. Some still feel that way. While skilled, malicious attackers do exist, they remain a small minority of the total number of people who actually discover new flaws in software. Today, as a part of Trend Micro, the ZDI represents the world’s largest vendor-agnostic bug bounty program. Our approach to the acquisition of vulnerability information is different from other programs. No technical details concerning the vulnerability are sent out publicly until the vendor has released a patch. We do not resell or redistribute the vulnerabilities that are acquired through the ZDI. Interested researchers provide us with exclusive information about previously un-patched vulnerabilities they have discovered. The ZDI then collects background information in order to validate the identity of the researcher strictly for ethical and financial oversight. Our internal researchers and analysts validate the issue in our security labs and make a monetary offer to the researcher. If the researcher accepts the offer, a payment will be promptly made. As a researcher discovers and provides additional vulnerability research, bonuses and rewards can increase through a loyalty program similar to a frequent flier program.
- Website
-
https://www.zerodayinitiative.com
External link for TrendAI Zero Day Initiative
- Industry
- Computer and Network Security
- Company size
- 11-50 employees
- Headquarters
- Austin, Texas
- Type
- Public Company
- Founded
- 2005
- Specialties
- Reverse Engineering, Security Research, Vulnerability Disclosure, Security, Information Assurance, Exploit Development, and Fuzzing
Locations
-
Primary
Get directions
11305 Alterra Pkwy
Austin, Texas 78758, US
Employees at TrendAI Zero Day Initiative
Updates
-
CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad app - The TrendAI Research team takes a deep dive into this recently patched file parsing bug to show you the root cause, provides a source code walk-through, and offers generic detection guidance. Read the details at https://lnkd.in/e4r2CZJi
-
Wrapping up #Pwn2Own Automotive 2026! TrendAI ZDI's Brian Gorenc and Dustin C. Childs, CISSP provide all the highlights of the event, where we awarded over $1,000,000 for 76 0-days. Fuzzware.io was awarded Master of Pwn with $215,500 in earnings and 28 points. Check it out at https://lnkd.in/ereMjqMY #P2OAuto
Wrapping Up Pwn2Own Automotive 2026
https://www.youtube.com/
-
ICYMI: ZDI researcher Peter Girnus published his work on ÆSIR: a platform that combines AI automation with expert oversight to find 0 -day vulnerabilities in AI infrastructure – so far, he's discovered 21 CVEs across NVIDIA, Tencent, and MLflow since mid-2025. https://lnkd.in/eeJUSqug
-
Join us for the kick-off of Pwn2Own Automotive 2026! We have nearly 80 entries across all of the categories, which makes this our biggest contest ever! As always, we begin the event with a random drawing to see the order of attempts for the contest, which starts first thing on Wednesday, January 21. Once the drawing is complete, we'll post the full schedule on our blog at https://lnkd.in/esZRrqdK
Pwn2Own Automotive 2026 - Drawing for Order
www.linkedin.com
-
No time to read the blog? Join Dustin C. Childs, CISSP for the Patch Report, where he highlights what you need to know most about January's Patch Tuesday. https://lnkd.in/e7cpUHB9
The Patch Report for January 2026
https://www.youtube.com/
-
He may be in Tokyo prepping for #Pwn2Own Automotive, but Patch Tuesday waits for no one. Join Dustin C. Childs, CISSP as he breaks down a big #Microsoft release (with 1 CVE actively exploited in the wild) and a smallish #Adobe release. https://lnkd.in/eS-Qtkzi
-
Celebrating over 20 years of empowering researchers and protecting users through world-leading #vulnerability discovery and coordinated disclosure. Discover how Trend Zero Day Initiative™ continues to shape the future of cybersecurity https://lnkd.in/ep-NJrzs
-
It's Patch Tuesday again - the penultimate one for 2025. Join Dustin C. Childs, CISSP, as he breaks down the release and highlights what you need to know in the Patch Report. https://lnkd.in/eUNQfPYr
The Patch Report for November 2025
https://www.youtube.com/
-
#Pwn2Own Join us for a live look-in from Pwn2Own Ireland 2025. In this highlight from Day Three, the team from Interrupt Labs will be targeting the Samsung Galaxy S25 - Remote in the Mobile Phones category for $50,000 and 5 Master of Pwn Points.
Live from Pwn2Own Ireland: Interrupt Labs vs. Samsung Galaxy
www.linkedin.com