Exodus Intelligence

@XI_Research

Industry leading provider of exclusive zero-day vulnerability intelligence, exploits, defensive guidance, and vulnerability research trends.

Vrijeme pridruživanja: travanj 2012.

Tweetovi

Blokirali ste korisnika/cu @XI_Research

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @XI_Research

  1. 9. ruj 2019.

    Patch-gapping in practice: Google Chrome edition (by of our nDay team)

    Poništi
  2. 8. srp 2019.

    We’re still growing, and looking for more elite researchers. Check out the job openings at

    Poništi
  3. 28. svi 2019.
    Poništi
  4. 20. svi 2019.

    Check out part 1 of the blog post by for his winning Pwn2Own entry on Edge (sbx part2 coming next)

    Poništi
  5. 17. svi 2019.

    . of our Nday team exploits the recently patched CVE-2019-0808 win32k bug to escape the chrome sandbox

    Poništi
  6. 11. tra 2019.

    If you're at zer0con this week, stop by and check out talk on exploiting Magellan bug on Chrome

    Poništi
  7. 3. tra 2019.

    So of our nDay team is back at it - this time with a chrome 1day exploit that targets the latest stable version

    Poništi
  8. 9. lis 2018.

    After a good amount of feedback and requests, we have decided to move our Intro to Embedded System training back to Feb 18, 2019. We have also extended the early ticket discount to reflect the new dates.

    Poništi
  9. 10. ruj 2018.

    Our Nday team has uncovered a failed patch in TrueKey. It has been reported and a patch was attempted. Read more:

    Poništi
  10. proslijedio/la je Tweet
    5. ruj 2018.

    Excited to announce the second embedded training by . The training has been modified to include cases for both ARMv7 and MIPS. Also, any logic based case(s) from the previous training has been replaced with memory corruption based case(s).

    Prikaži ovu nit
    Poništi
  11. 5. ruj 2018.

    Announcing our 2nd training for 2018: Introduction to Embedded Exploitation. Taught by David Barksdale and

    Poništi
  12. 22. svi 2018.
    Poništi
  13. 30. tra 2018.

    Our fuzzers need some TLC. We're looking to hire a master fuzzer. Remote/International applications accepted. Apply to info@exodusintel.com

    Poništi
  14. 3. tra 2018.

    We have an open position on our N-Day research team. If you have experience understanding and exploiting known/patched vulnerabilities, please apply to info@exodusintel.com

    Poništi
  15. 19. velj 2018.

    We are excited to welcome as our newest addition to the Exodus Vulnerability Research Team!

    Poništi
  16. 18. sij 2018.

    We still have a few seats left in our March 5th Intro to Embedded Exploitation training with and David Barksdale. Don't miss out!

    Poništi
  17. 24. lis 2017.

    Announcing our 1st training for 2018: Introduction to Embedded Exploitation. Taught by David Barksdale and

    Poništi
  18. 28. ruj 2017.

    We're always hiring researchers, but we have updated our postings with Sales, Account Manager and Jr Dev positions.

    Poništi
  19. 26. srp 2017.
    Poništi
  20. 20. srp 2017.

    It looks like has pushed a patch for 's bug as well:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·