Tweetovi

Blokirali ste korisnika/cu @Mingjian_Zhou

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Mingjian_Zhou

  1. proslijedio/la je Tweet
    10. sij

    Android: ashmem readonly bypasses via remap_file_pages() and ASHMEM_UNPIN

    Poništi
  2. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  3. proslijedio/la je Tweet
    11. pro 2019.

    New guidance on Linux-stable Merges for Android: -- looks positive, reducing the patch gap for upstream kernel security bugs is really important. The window of exposure for publicly known issues is too long at the moment.

    Poništi
  4. proslijedio/la je Tweet
    5. stu 2019.

    The art of N day exploit. 1-Click Android 10 Remote rooting demo.

    Poništi
  5. proslijedio/la je Tweet
    15. lis 2019.

    The writeup and release is here! Tailoring CVE-2015-2215 to Achieve Root -

    Poništi
  6. proslijedio/la je Tweet

    Android: pointer leak via insufficient binder message verification

    Poništi
  7. proslijedio/la je Tweet
    3. ruj 2019.

    Announcement: We've updated our prices for major Mobile exploits. For the first time, we will be paying more for Android than iOS. We've also increased WhatsApp & iMessage (0-click) but reduced the payout for iOS (1-click) in accordance with market trends:

    Poništi
  8. proslijedio/la je Tweet
    22. kol 2019.

    New blog post on an iMessage bug that allows files to be read off an iPhone remotely!

    Poništi
  9. proslijedio/la je Tweet
    21. kol 2019.

    We've finally managed to update our Secure Boot Technical Overview to cover the enhancements from the last couple of years (h/t for the excellent initial document). Find this and a whitepaper on secure storage in TrustZone at .

    Poništi
  10. proslijedio/la je Tweet
    21. kol 2019.

    If you're at Linux Security Summit NA this morning, I'll be talking about all the work going into hardening the Linux kernel! And if you can't make it, video should be available in a few days. In the meantime, the slides are here:

    Poništi
  11. proslijedio/la je Tweet
    8. kol 2019.
    Poništi
  12. proslijedio/la je Tweet
    29. tra 2019.

    It's finally here! I have published my Intro to Android App Reverse Engineering workshop! If you're interested in learning how to begin RE'ing Android apps (both DEX and native code), check out this workshop.

    Screenshot of front page of the Android app reversing workshop.
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    8. kol 2019.

    Here are the slides from my talk on reversing Android pre-installed apps & case studies of pre-installed security issues!

    Screenshot of my title slide "Securing the System: A deep dive into Reversing Android Pre-Installed Apps"
    Poništi
  14. proslijedio/la je Tweet
    8. kol 2019.

    Apple’s new bounty program(includes macOS) and 0-click JB = $1,000,000~🎊🎊🎊

    Poništi
  15. proslijedio/la je Tweet
    8. kol 2019.

    Couldn't agree more with on this slide, shout-out to IR teams in this industry!

    Poništi
  16. proslijedio/la je Tweet
    7. kol 2019.

    Project Zero blog: "The Fully Remote Attack Surface of the iPhone" by Natalie Silvanovich () -

    Poništi
  17. proslijedio/la je Tweet
    31. srp 2019.
    Poništi
  18. proslijedio/la je Tweet
    17. srp 2019.

    Linux v5.2 is out! I'm excited about page allocator freelist randomization, Clang stack variable autoinitialization, PPC kernel userspace access prevention, MDS mitigations, userfaultfd sysctl knob, separate mm for text poking, and implicit fallthrough.

    Poništi
  19. 17. svi 2019.
    Poništi
  20. 13. svi 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·