https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html … thanks to @_clem1, @5aelo for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.
-
Prikaži ovu nit
-
It covers every vulnerability in detail, including root cause analysis, what steps could have been taken to prevent the bugs, and what steps should be taken to ensure they don’t happen again.
9 replies 34 proslijeđena tweeta 231 korisnik označava da mu se sviđaPrikaži ovu nit -
We’ll look at how the attackers modify their exploitation techniques over time to defeat new mitigations, and investigate the capabilities of the attacker’s implant to access personal information on the exploited devices.
9 replies 31 proslijeđeni tweet 224 korisnika označavaju da im se sviđaPrikaži ovu nit
Odgovor korisniku/ci @i41nbeer
Admitting that I have yet fully read, did you get any info in terms of attribution you can disclose? ;)
04:48 - 30. kol 2019.
0 replies
0 proslijeđenih tweetova
0 korisnika označava da im se sviđa
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.