SemmleOvjeren akaunt

@Semmle

A code analysis platform for finding zero-days and automating variant analysis | Creators of QL and

SF | NYC | Seattle | Oxford | Copenhagen | Valencia
Vrijeme pridruživanja: veljača 2016.

Medijski sadržaj

  1. 26. ruj 2019.

    Imagine if your dev team could have automated code review powered by security expertise? Join and as they share their vision for community-powered secure development:

  2. 26. ruj 2019.

    Congrats to our CTF challenge winners and ! These intrepid developers tested their vulnerability hunting skills by writing QL queries on the U-Boot code base

  3. 6. ruj 2019.

    The Challenge ends today! Last chance to submit your QL query for a chance to win wireless headphones. Winners will be announced next week... stay tuned!

  4. 5. ruj 2019.

    One day left to join the Challenge. Write a little QL, find some vulns and win a pair of wireless headphones. It's simple, really.

  5. 3. ruj 2019.

    Only 4 days remaining...Join the Challenge today for a chance to win a pair of wireless headphones just by writing a little QL query

  6. 27. kol 2019.

    We just extended the Challenge from until Sept 6! Simply follow these instructions to find real vulnerabilities in Das U-Boot using QL and submit your query for a chance to win a pair of these!

  7. 20. kol 2019.

    "The most critical issues fixed are use-after-free and OOB write vulnerabilities. They could each potentially be used by an attacker to execute code on the victim machine through a specially crafted file," says about VLC in

  8. 14. kol 2019.

    Take the Semmle CTF challenge! Can you find a critical bug in using QL, our simple, code query language?

  9. 8. kol 2019.

    Ready for Day 2 of ? Swing by Booth IC2112 to take the challenge and talk with and our security research team.

  10. 7. kol 2019.

    Great vibe and epic view...the cocktails are flowing at the and party right now! Come have a drink with us 🍸

  11. 7. kol 2019.

    Semmle CSO sharing our vision for open security and a real world example of how he used a U-Boot zero day to find all its variants.

  12. 7. kol 2019.

    Wondering how found 13 CVEs in U-boot? Join his presentation "Using One Seed and Automated Variant Analysis to Eradicate an Entire Vulnerability Class" in 30 min in Business Hall Theater A.

  13. 7. kol 2019.

    Today at 11:30, join for his talk, "Using One Exploitable Zero Day to Eradicate an Entire Class of Vulnerabilities" in Business Hall Theater A

  14. 6. kol 2019.

    We're in Vegas for 🙌 Swing by our booth IC2112, take the challenge to win prizes, and talk shop with our security research team. Get details here:

  15. 5. kol 2019.

    Test your vulnerability hunting skills on a real code base at 2019. Find variants of a known vulnerability for your chance to win a pair of Bose headphones and other cool prizes. Visit at Booth IC2112

  16. 3. kol 2019.

    Only a few more days until ! 🎉 Check out events including presentation, Welcome Reception with and more - get details here:

  17. 2. kol 2019.

    Attending ? Join & Vulnerability Hunters Welcome Reception for spectacular views, food and cocktails at Bally's Penthouse Suite. Wednesday, Aug 7th at 7pm. RSVP here:

  18. 2. kol 2019.

    [WEBINAR] Watch "How to find type confusion vulnerabilities in Ghostscript" for a deep dive into recent exploits:

  19. 1. kol 2019.

    Product security on your mind? Schedule your 1:1 meeting at with our security research team including and to discuss anything from threat modeling to scaling your security team.

  20. 31. srp 2019.

    Wondering how and team found 13 CVEs in U-boot? Join him at for "Using One Exploitable Zero-Day to Eradicate an Entire Class of Vulnerabilities" on Wed, Aug 7th at 11:30am

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·