Tweets

You blocked @_clem1

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @_clem1

  1. Retweeted
    Jan 26

    I should mention I'm hiring security engineers both in Sunnyvale and Zürich. Come shape how we do automated security scanning at Google, and find more bugs in a hour than all bughunters combined in a day.

    Show this thread
    Undo
  2. Retweeted

    Security Advisory - Microsoft Guidance on Scripting Engine Memory Corruption - for more information please visit:

    Undo
  3. Retweeted
    Jan 17

    New Internet Explorer 0day and advisory out. Exploited in wild. No patch from Microsoft. Mitigation is to not use IE. CVE-2020-0674

    Undo
  4. Retweeted
    Jan 9

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Show this thread
    Undo
  5. Retweeted
    6 Dec 2019

    Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.

    Undo
  6. Retweeted
    6 Dec 2019

    The Gomium Browser - Exploits different approaches including an unexpected Go compiler bug, well done & others!

    Undo
  7. Retweeted

    The latest security from and are live. Join as he covers the details and shows which bugs are under active attack.

    Undo
  8. Retweeted
    31 Oct 2019

    Your other Halloween scare, looks like a Chrome 0-day: "CVE-2019-13720: Use-after-free in audio. Reported by Anton Ivanov and Alexey Kulaev at Kaspersky Labs on 2019-10-29 Google is aware of reports that an exploit for CVE-2019-13720 exists in the wild."

    Show this thread
    Undo
  9. Retweeted
    28 Oct 2019

    My team at Google is hiring for a threat intel role focused on crimeware and botnets. Some RE experience preferred, and willingness to relocate to Zurich (no remote, sorry). DM’s open!

    Undo
  10. Retweeted
    17 Oct 2019

    I'm ecstatic that we have gotten to a very good state with site isolation in Chrome - . More details are available at .

    Undo
  11. Retweeted
    23 Sep 2019

    if the had a loyalty program, would be a Diamond Globalist Ambassador Elite member.

    Undo
  12. Retweeted
    23 Sep 2019

    Want one of these awesome challenge coins? Join the Google Detection & Response team! We are still hiring in Sunnyvale, Sydney, Kirkland, New York and Zürich!!

    Undo
  13. Retweeted

    IE 0day discovered in wild by TAG's exploit hunter Patch/Advisory out quickly from Microsoft. Thanks !

    Undo
  14. Retweeted

    An excellent deep dive by Project Zero’s into the iOS bugs TAG found exploited in the wild back in February by

    Undo
  15. Retweeted
    29 Aug 2019

    thanks to , for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.

    Show this thread
    Undo
  16. Retweeted
    20 Aug 2019
    Undo
  17. Retweeted
    9 Aug 2019

    In case you missed 's talk at this week, here is a video showing a remote exploit for one of the iMessage bugs we found: Be sure to read if you are interested in these kinds of attacks!

    Undo
  18. Retweeted
    12 Jul 2019

    v8 bug -> pdf socket api bug -> NTLM reflection attack -> sandbox escape wow..

    Show this thread
    Undo
  19. Retweeted
    11 Jul 2019

    I wrote a thing about a Chakra RCE for which the JIT trigger is tweetable :) function opt(o) { o.pwn = o.a; }

    Undo
  20. Retweeted
    10 Jul 2019
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·