Not directly related, and I've said it before, but it's useful to see what ITW categories get exploited, use it to guesstimate profitability, level of complexity, and engineering work, and use it as a level-setting exercise for bug bounty payoutshttps://twitter.com/pwnallthethings/status/1416800505049845760 …
-
-
I don't think you'd find exploit chains like this at that price anywhere outside of some deluded fantasy of some Apple executives tho.
-
My point is that the security program is several factors short of even covering the salaries of the researchers who built it, never mind coming close to denting the offensive market.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.