Tweetovi

Blokirali ste korisnika/cu @360CoreSec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @360CoreSec

  1. Security Risks in Zero Knowledge Proof Cryptocurrencies

    Poništi
  2. Congratulate Gong Guang of Alpha Lab on winning $201,337 for reporting two full chain RCEs on the Pixel 3 device. It's the highest bug reward in 2019 and the highest reward for a single exploit chain across all Google VRP program. The bugs have already been fixed.

    Poništi
  3. proslijedio/la je Tweet
    16. stu 2019.

    Congratulations to 360Vulcan to become the biggest winner of 2019 winning a total bonus of $382,500!

    Poništi
  4. Cross-platform cyber-attacks attributed to Syrian Electronic Army have been disclosed by 360 Threat Intelligence Center, including the arsenal of APT groups Golden Rat ( APT-C-27) and Pat Bear (APT-C-37). Click to read the report:

    Poništi
  5. Congrats to Yuki of 360Vulcan, the No.1 on 2019 MSRC Most Valuable Security Researchers list. Qixun Zhao ranks No.2, he also won the Pwnie for Best Privilege Escalation Bug. Another 8 researchers on the list are also from 360 security teams. Congrats!

    Poništi
  6. proslijedio/la je Tweet
    23. svi 2019.

    In case you don’t know: it’s a stable remote code execution demo for CVE-2019-0708 on Windows 7 x64

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    20. svi 2019.

    CVE-2019-0708 remote scan tool by 360Vulcan team. Detect the recent RDP bug via RDP packet behavior, without trigger the final bug path(no BSOD or any side effect on the target system), ask for it to scan your network by sending mail to cert at

    Poništi
  8. Microsoft fixed a Windows 0day (CVE-2019-0808) in Patch Tuesday. Our team constructed the POC and reproduced the vulnerability triggering process. Click here to read more:

    Poništi
  9. A destructive Binder kernal vul (CVE-2019-2025) was patched in in March. The credit goes to Hongli Han() from 360 C0RE Team. Nice work! Click the link to learn more tech details:

    Poništi
  10. Remember the iPhoneX jailbreak on TianfuCup PWN Contest earning the highest reward? The discovery story of the vul is here (by ) Apple has released the patch and you can update your iPhone now.

    Poništi
  11. Among the Top 5 researchers of Technologies' Vulnerability Rewards Program , two are from 360 IceSword Lab. Congrats! Hard work pays off!

    Poništi
  12. proslijedio/la je Tweet
    22. sij 2019.

    Here is the PoC of the bug I used to jailbreak can work before 12.1.2..The blog post about exploit on A12 will come soon.😀

    Poništi
  13. Zhenhao Hong from 360 IceSword Lab was rewarded $200,000 by Microsoft -V for his VM escape – one of the highest MSRC bounties ever We will release details after the patch. Congrats to and (Weibo: , @PJF_)

    Poništi
  14. New attacks were discovered against a Russian polyclinic, exploiting a Flash vulnerability (CVE-2018-15982). The vul has been reported to Adobe and the patch was released already.

    Poništi
  15. New analysis report from our researchers available: All roads lead to Rome - Many ways to double spend your cryptocurrency ()

    Poništi
  16. proslijedio/la je Tweet
    17. stu 2018.

    With the end of Day Two, Contest has also come to the end. 10 teams and individual players have given 24 excellent demonstrations. 11 out 13 targets were compromised and 30 were exploited, with a total amount of $1,024,000 being awarded.

    Poništi
  17. Poništi
  18. proslijedio/la je Tweet
    16. stu 2018.

    team used an integer overflow bug to compromise . They earned 8 points and $80,000.

    Poništi
  19. Poništi
  20. Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·