https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html … thanks to @_clem1, @5aelo for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.
-
Prikaži ovu nit
-
@dekeneas is a top of the chain that can detect with a high accuracy the waterhole attacks1 reply 0 proslijeđenih tweetova 4 korisnika označavaju da im se sviđa
Google TAG uses similar technology. Great work!
02:22 - 30. kol 2019.
0 replies
0 proslijeđenih tweetova
2 korisnika označavaju da im se sviđa
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.