Boris Larin

@oct0xor

Security researcher interested in reverse engineering, vulnerabilities, exploits, embedded (game consoles in particular). Work @ Kaspersky Lab.

Vrijeme pridruživanja: kolovoz 2011.

Medijski sadržaj

  1. 5. velj

    Did you enjoy "Overview of the latest Windows OS kernel exploits found in the wild" ? It was about 0days that we found in 2018. Tomorrow at I present Part 2 about stuff that we found in 2019.

  2. 21. sij
  3. 14. sij

    Uploaded updated slides for our webinar "The evolution and future of supply chain attacks", as today they seem to be more relevant than ever

    Prikaži ovu nit
  4. 25. pro 2019.

    We accidentally stayed near PlayStation themed building in Leipzig

  5. 11. pro 2019.

    Greatness Awaits! Lecture hall "Saal Borg" 2019-12-28 at 22:10 +0100 CET

  6. 19. lis 2019.

    CODE BLUE 2019 programme is really well put together. Supply chains, vuln research, IoT, malware analysis

    Prikaži ovu nit
  7. 18. lis 2019.
  8. 20. kol 2019.

    Second day of ISC 2019 was very interesting. Kudos to

  9. 16. kol 2019.
    Prikaži ovu nit
  10. 16. kol 2019.

    Little tired of travel... but I just could not refuse an offer to give a keynote at Internet Security Conference 2019 by Qihoo 360!

    Prikaži ovu nit
  11. 1. lip 2019.

    Shanghai skyline is beautiful at any time of night and day

  12. 29. svi 2019.

    . just announced CFG 2.0 and new hardware security improvements at

  13. 23. svi 2019.

    Very excited to talk about latest zero-days that we found together with at first ever BlueHat Shanghai next week! Lineup of talks looks incredible

  14. 20. svi 2019.

    We analyzed the vulnerability CVE-2019-0708 and can confirm that it is exploitable. We have therefore developed detection strategies for attempts to exploit it and would now like to share those with trusted industry parties. Please contact: nomoreworm@kaspersky.com

  15. 18. svi 2019.

    I had to write a lot of RDP related code lately... Only because zero details shared and we need to protect our customers -2019-0708

  16. 12. tra 2019.

    3/3 "Catching multilayered zero-day attacks on MS Office". , me and with shout out to who was not able to attend

    Prikaži ovu nit
  17. 10. tra 2019.

    2/3 "Hacking Microcontroller Firmware through a USB"

    Prikaži ovu nit
  18. 9. tra 2019.

    This time I give 3 presentations at SAS! 1/3

    Prikaži ovu nit
  19. 19. sij 2019.
    Odgovor korisnicima

    POC for -2018-8453 that was sent to Microsoft at time of original blog post

  20. 9. stu 2018.

    I can't believe that it's been more than a month since amazing and conferences! I have really enjoyed presenting my research here and met a lot of cool people.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·