It covers every vulnerability in detail, including root cause analysis, what steps could have been taken to prevent the bugs, and what steps should be taken to ensure they don’t happen again.
-
-
Prikaži ovu nit
-
We’ll look at how the attackers modify their exploitation techniques over time to defeat new mitigations, and investigate the capabilities of the attacker’s implant to access personal information on the exploited devices.
Prikaži ovu nit
Kraj razgovora
Novi razgovor -
-
-
@i4nbeer Will you be sharing any of the watering hole sites or *any* IOC's? i don't see any in the extensive blog posts. Thanks -
Would be very interested in the IP it was contacting. I would like to find out if any of our users where infected. As that must be decommissioned now I can’t see the harm in releasing the IP for people to check logs?
- Još 1 odgovor
Novi razgovor -
-
-
The exploiter god is back
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
@Pwn20wnd@qwertyoruiopz@FCE365@Jakeashacks What can these exploits be used for? -
Highly suggest you skim the docs if it's of interest. Looks like GPS, messaging, photos are included.
- Još 1 odgovor
Novi razgovor -
-
-
Wow, very scary yet informative write up. This gives me the chills that any site can do this. Thanks for coming out with these writeups
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
@dekeneas is a top of the chain that can detect with a high accuracy the waterhole attacks -
Google TAG uses similar technology. Great work!
Kraj razgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.