ChannelLife Australia - Industry insider news for technology resellers
Realistic computer with shield on screen surrounded by digital code for cybersecurity

Trend Micro’s Zero Day Initiative marks two decades of impact

Tue, 12th Aug 2025

Trend Micro's Zero Day Initiative (ZDI) is marking its twentieth year of reporting and coordinating disclosures of software vulnerabilities across the digital landscape.

The ZDI claims the position as the world's largest vendor-agnostic bug bounty programme, having helped to identify and disclose thousands of software security flaws since its founding in 2005. According to data referenced by the company, the ZDI contributed to the responsible disclosure of 73 per cent of all reported vulnerabilities in 2024, exceeding the total from all other participating vendors combined.

The bug bounty programme incentivises security researchers globally to uncover zero-day vulnerabilities in widely used products and to submit them in exchange for financial rewards. By working with vendors ahead of public disclosure, the ZDI aims to close security gaps before malicious actors can exploit them.

One of the notable features for Trend customers is early access to virtual patches for zero-day threats. These interim security fixes are distributed, on average, over two months in advance of the release of official vendor updates. This provides an extended window of protection as vendors work to develop and test their formal patches.

"Our top priority is empowering our customers to take a proactive approach to cybersecurity. The Zero Day Initiative is one of the best tools we have to stay ahead of cybercriminals, and it's one of a kind. Nobody else in the industry can protect their customers as far in advance as we do."

This was stated by Mick McCluney, ANZ Field CTO at Trend Micro, who emphasised the significance of proactive approaches enabled by the ZDI's work.

The initiative's history began in 2005 when it was established by TippingPoint, then a division of 3Com. Initially, it focussed on bringing together the security research community, providing a framework for researchers to report zero-day bugs responsibly by offering financial incentives. Two years later, the Pwn2Own competition was launched, challenging teams of researchers to discover vulnerabilities in specific software and operating system categories against the clock.

Trend Micro took over the ZDI in 2016 following its acquisition of TippingPoint. Today, the programme comprises more than 450 dedicated researchers across 14 global threat centres, supported by a broader community of over 19,000 vulnerability researchers.

The ZDI has played a role in several major security events over the past two decades. For example, its researchers uncovered issues with a patch intended to fix a LNK file vulnerability exploited by the Stuxnet worm, prompting Microsoft to develop a subsequent patch. Similarly, collaborative research with Microsoft led to the award of USD $125,000 to original ZDI researchers for identifying a method to bypass Internet Explorer's defences; this sum was subsequently donated to charity, and the technique went on to earn a patent.

Other notable research successes include the identification of two zero-day vulnerabilities in Apple's QuickTime for Windows product, which resulted in Apple discontinuing support for the software and ZDI advising users to uninstall it. The ZDI's investigative output has also contributed to disrupting covert operation campaigns such as Black Energy APT, which has targeted Ukraine on multiple occasions. In 2023, a researcher associated with the ZDI was recognised with a Pwnie award for "most under-hyped research" after discovering a previously unreported exploit technique called activation context cache poisoning.

The ZDI's operations not only benefit Trend Micro's client base but also contribute to improved security outcomes more broadly, by ensuring that vulnerabilities in widely used products are fixed before hostile actors can take advantage. The bug bounty scheme is credited with encouraging vendors to implement more robust security practices and to address security flaws ahead of public exploitation.

As one of the larger vendor-neutral vulnerability research communities, ZDI continues to rely on its global network of researchers, ethical hacking competitions such as Pwn2Own, and partnerships with vendors, to fulfil its remit of identifying and coordinating the remediation of critical security flaws.

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X