https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html … thanks to @_clem1, @5aelo for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.
-
Prikaži ovu nit
-
It covers every vulnerability in detail, including root cause analysis, what steps could have been taken to prevent the bugs, and what steps should be taken to ensure they don’t happen again.
9 replies 34 proslijeđena tweeta 231 korisnik označava da mu se sviđaPrikaži ovu nit -
We’ll look at how the attackers modify their exploitation techniques over time to defeat new mitigations, and investigate the capabilities of the attacker’s implant to access personal information on the exploited devices.
9 replies 31 proslijeđeni tweet 224 korisnika označavaju da im se sviđaPrikaži ovu nit -
Odgovor korisniku/ci @i41nbeer
Please follow for DM. I have questions about why you are not naming the targeted population.
1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
My DMs are open for anyone who can provide detail on the exploited websites and targeted population.
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.