Twitter | Pretraživanje | |
clem1
I flip bits.
661
Tweetovi
402
Pratim
2.863
Osobe koje vas prate
Tweetovi
clem1 proslijedio/la je tweet
Ben Hawkes 8 h
We're excited to welcome Felix Wilhelm () to Project Zero today!
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
Claudio Criscione 26. sij
I should mention I'm hiring security engineers both in Sunnyvale and Zürich. Come shape how we do automated security scanning at Google, and find more bugs in a hour than all bughunters combined in a day.
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
Security Response 17. sij
Security Advisory - Microsoft Guidance on Scripting Engine Memory Corruption - for more information please visit:
Reply Retweet Označi sa "sviđa mi se"
clem1 18. sij
Odgovor korisniku/ci @ItsReallyNick @cglyer
We might have a similar rule, heh. Hopefully one day we will be able to release more details about these exploits. Qihoo might release details for this one?
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
Jorge Orchilles 18. sij
New Internet Explorer 0day and advisory out. Exploited in wild. No patch from Microsoft. Mitigation is to not use IE. CVE-2020-0674
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
Samuel Groß 9. sij
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
Axel Souchet 6. pro
Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
StalkR 7. pro
The Gomium Browser - Exploits different approaches including an unexpected Go compiler bug, well done & others!
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
Zero Day Initiative 12. stu
The latest security from and are live. Join as he covers the details and shows which bugs are under active attack.
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
Chris Evans 1. stu
Your other Halloween scare, looks like a Chrome 0-day: "CVE-2019-13720: Use-after-free in audio. Reported by Anton Ivanov and Alexey Kulaev at Kaspersky Labs on 2019-10-29 Google is aware of reports that an exploit for CVE-2019-13720 exists in the wild."
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
Antti Tikkanen 28. lis
My team at Google is hiring for a threat intel role focused on crimeware and botnets. Some RE experience preferred, and willingness to relocate to Zurich (no remote, sorry). DM’s open!
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
Nasko Oskov 17. lis
I'm ecstatic that we have gotten to a very good state with site isolation in Chrome - . More details are available at .
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
billy leonard 24. ruj
if the had a loyalty program, would be a Diamond Globalist Ambassador Elite member.
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
Heather Adkins 23. ruj
Want one of these awesome challenge coins? Join the Google Detection & Response team! We are still hiring in Sunnyvale, Sydney, Kirkland, New York and Zürich!!
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
Shane Huntley 23. ruj
IE 0day discovered in wild by TAG's exploit hunter Patch/Advisory out quickly from Microsoft. Thanks !
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
Shane Huntley 30. kol
An excellent deep dive by Project Zero’s into the iOS bugs TAG found exploited in the wild back in February by
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
Ian Beer 30. kol
thanks to , for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
BSDSec.net 20. kol
[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-19:22.mbuf...
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
Samuel Groß 9. kol
In case you missed 's talk at this week, here is a video showing a remote exploit for one of the iMessage bugs we found: Be sure to read if you are interested in these kinds of attacks!
Reply Retweet Označi sa "sviđa mi se"
clem1 proslijedio/la je tweet
ohjin 12. srp
v8 bug -> pdf socket api bug -> NTLM reflection attack -> sandbox escape wow..
Reply Retweet Označi sa "sviđa mi se"