It covers every vulnerability in detail, including root cause analysis, what steps could have been taken to prevent the bugs, and what steps should be taken to ensure they don’t happen again.
-
-
Show this thread
-
We’ll look at how the attackers modify their exploitation techniques over time to defeat new mitigations, and investigate the capabilities of the attacker’s implant to access personal information on the exploited devices.
Show this thread
End of conversation
New conversation -
-
-
@i4nbeer Will you be sharing any of the watering hole sites or *any* IOC's? i don't see any in the extensive blog posts. Thanks -
Would be very interested in the IP it was contacting. I would like to find out if any of our users where infected. As that must be decommissioned now I can’t see the harm in releasing the IP for people to check logs?
- 1 more reply
New conversation -
-
-
The exploiter god is back
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@Pwn20wnd@qwertyoruiopz@FCE365@Jakeashacks What can these exploits be used for? -
Highly suggest you skim the docs if it's of interest. Looks like GPS, messaging, photos are included.
- 1 more reply
New conversation -
-
-
Wow, very scary yet informative write up. This gives me the chills that any site can do this. Thanks for coming out with these writeups
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@dekeneas is a top of the chain that can detect with a high accuracy the waterhole attacks -
Google TAG uses similar technology. Great work!
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.