Tuan Dinh Van 🇻🇳

167 posts

Tuan Dinh Van 🇻🇳 banner
Tuan Dinh Van 🇻🇳

Tuan Dinh Van 🇻🇳

@tunadv

Security engineer | MSRC 2024 Q3/4 | MSRC 2025 MVR

Katılım Ocak 2021
740 Takip Edilen170 Takipçiler
Tuan Dinh Van 🇻🇳 retweetledi
Immunefi
Immunefi@immunefi·
Security researcher ily2 has just earned a staggering $3,000,000 from submitting a critical smart contract bug via Immunefi. That's the largest single payout in web3 security in recent memory. In total, he's submitted 3 reports. All 3 were paid. 100% accuracy. His leaderboard update is coming soon, but you can pledge IMU to him now and earn when he finds the next one: immunefi.com/pledge/ily2
Immunefi tweet media
English
197
157
1.2K
337.7K
Tuan Dinh Van 🇻🇳 retweetledi
Youssef Sammouda (sam0)
Youssef Sammouda (sam0)@samm0uda·
$312,500 worth of stored/reflected XSS vulnerabilities in Meta’s Conversions API Gateway allowed Javascript code to run on any Facebook domain and millions of third-party websites. The flaw enabled zero-click Facebook account takeover and more: ysamm.com/uncategorized/…
English
38
227
1.3K
198.4K
Dung Le
Dung Le@LTiDiii·
BB 2025 Recap - Top 14 H1 Crit Rep, Top 16 H1 Highest Rep, Top 2 H1 🇻🇳(Cheers Top 1 @thaivd98), Top 2 GG🇻🇳 - Stop at Elite 8 H1 AWC vs talented🇪🇸 - 1st GG LHE, 1st H1 LHE, Flysec 1st Hack Trip - Amazing memories in 🇻🇳 w 🇪🇸 friends - More Flysec's mems joined fly w hacking dreams!
Dung Le tweet mediaDung Le tweet mediaDung Le tweet mediaDung Le tweet media
English
7
0
80
3.3K
Janlele91 🇻🇳
Janlele91 🇻🇳@janlele91·
$6000 bounty for a juicy SSRF that exposed internal files, K8s access tokens & Lambda runtime API 😎 Massive props to @saur1n — killer teamwork on this one! Customer paid directly, no Bugcrowd triage needed. #Bugcrowd #SSRF
Janlele91 🇻🇳 tweet media
English
11
9
277
18.9K
Tuan Dinh Van 🇻🇳 retweetledi
Microsoft Security Response Center
Microsoft Security Response Center@msftsecresponse·
Congratulations to all the researchers recognized in this quarter’s MSRC 2025 Q3 Security Researcher Leaderboard! Thanks to all the researchers who partnered with us for your hard work and continued dedication to securing our customers. Learn more in our blog post: msft.it/6016sfncp We also want to recognize the top 10 researchers in the leaderboard: 🥇Brad Schlintz (@nmdhkr) 🥈 Yuval Avrahami 🥉 b2ahex 4. Jianyang song 5. Felix B. 6. Haifei Li @HaifeiLi 6. tuandv of Viettel Cyber Security 8. P1hcn 9. 0x140ce @0x140ce 10. Matthew Jensen
Microsoft Security Response Center tweet media
English
2
7
33
13.7K
Tuan Dinh Van 🇻🇳 retweetledi
DARKNAVY
DARKNAVY@DarkNavyOrg·
We triggered WhatsApp 0-click on iOS/macOS/iPadOS. CVE-2025-55177 arises from missing validation that the [Redacted] message originates from a linked device, enabling specially crafted DNG parsing that triggers CVE-2025-43300. Analysis of Samsung CVE-2025-21043 is also ongoing.
English
37
267
1.1K
276.6K
Tuan Dinh Van 🇻🇳 retweetledi
5pider
5pider@C5pider·
90% of my Twitter DMs are asking me about how to start getting into Malware development. Well, I love answering them but it's easier to write a small thread about it so here we go. 1/12
English
112
890
3.2K
0
Haifei Li
Haifei Li@HaifeiLi·
Look what I just received. Thank you @msftsecresponse for delivering the MVR 2025 swag box to me. 😊
Haifei Li tweet media
English
2
0
26
2.4K
Tuan Dinh Van 🇻🇳 retweetledi
Mandiant (part of Google Cloud)
🚨 We identified a ViewState deserialization attack affecting Sitecore deployments. The attacker leveraged an exposed ASP[.]NET machine key to perform remote code execution. Get the full details, indicators of compromise, and defensive recommendations: goo.gle/47oNWll
Mandiant (part of Google Cloud) tweet media
English
0
26
80
11.1K
Tuan Dinh Van 🇻🇳
Tuan Dinh Van 🇻🇳@tunadv·
My first year at MSRC and being in the top 100 MVR is something I am very proud of😊. Thank you @msftsecresponse for your enthusiastic support🫡. Congratulations to all the researchers on the leaderboard 🎉
Microsoft Security Response Center@msftsecresponse

The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s 100 Most Valuable Researchers (MVRs), based on the total number of points earned for each valid report. Please join us in celebrating this year’s MVRs, including our top 10: 1. 🥇 VictorV (@vv474172261) 2. 🥈 wkai 3. 🥉 Suresh Chelladurai 4. Anonymous 5. Adnan (@adnanthekhan) 6. Dhiral Patel (@dhiralpatel94) 7. Nan Wang (@eternalsakura13) and Ziling Chen 8. Anonymous 9. @0x140ce 10. Azure Yang (@4zure9) See the full list of this year’s 100 MVRs, in addition to our Azure, Office, Windows, and Dynamics 365 leaderboards: msft.it/6011s6KxU #bugbounty

English
2
0
10
434
Tuan Dinh Van 🇻🇳 retweetledi
Khoa Dinh
Khoa Dinh@_l0gg·
While waiting for the Pwn2Own chain, you might want to read this. Disclaimer: This is a bug I discovered by accident, and already been resolved. I’m not sure which CVE or patch this maps to. If you know any information, please feel free to leave a comment blog.viettelcybersecurity.com/sharepoint_pro…
Khoa Dinh tweet media
English
3
39
136
31.6K
Thái Vũ
Thái Vũ@thaivd98·
Q2 was a blast for me! Somehow reached Top 5 in @Hacker0x01 Leaderboard 🤪 Reached Top 5 in Highest Critical Reputation 🪲 Reached Top 3 in Web Application Asset Types 😁 Worked & played hard with my teammate @flysec_corp ❤️‍🔥 Let's see how it goes in Q3! 🤓 #TogetherWeHitHarder
Thái Vũ tweet mediaThái Vũ tweet mediaThái Vũ tweet media
English
11
2
93
5K
Tuan Dinh Van 🇻🇳 retweetledi
Check Point Research
Check Point Research@_CPResearch_·
Zero-Day used by Stealth Falcon APT group in a spear-phishing campaign: 💥 .URL file exploitation (assigned CVE-2025-33053) 🧰 Custom Mythic implants, LOLBins, and custom payloads 🌍 High-profile targets across the Middle East and Africa research.checkpoint.com/2025/stealth-f…
English
0
107
264
43.5K
Janlele91 🇻🇳
Janlele91 🇻🇳@janlele91·
Epic win in the bug bounty game @Bugcrowd ! Scored $X,XXX for a high-severity finding, then leveled up with an extra $X,XXX bonus after showing the real critical impact. Big thanks to the customer for the props - feeling relentless! 🥳 #BugBounty #bugbountytips #bugcrowd
Janlele91 🇻🇳 tweet media
English
7
2
123
6.1K