Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @tencent_blade
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @tencent_blade
-
No need to worry: SQLite and Google have already confirmed and fixed it and we are helping other vendors through it too. We haven't found any proof of wild abuse of Magellan 2.0 and will not disclose any details now. Feel free to contact us if you had any technical questions!https://twitter.com/tencent_blade/status/1209291255957508097 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Magellan 2.0 on its way! Blade researcher
@leonwxqian found another set of vulnerabilities in#SQLite which can result in remote code execution via WebSQL, leaking program memory or possible program crashes. More Q&As can be found at https://blade.tencent.com/magellan2/index_en.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CVE-2019-14835 is assigned for this issue.https://twitter.com/SEJeff/status/1174880212510789633 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We've decided to name this vulnerability as V-gHost. Details can be found at page https://blade.tencent.com/en/advisories/v-ghost/ …https://twitter.com/tencent_blade/status/1174510397077897217 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tencent Blade Team recently discovered a QEMU-KVM VM escape vulnerability that exists in vhost/vhost-net host linux kernel module. Attackers can trigger this bug from VM with priviledge account of the VM during the VM migration.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Our researcher
@GXiling talking about how to remotely exploit the hardware decoder on smartphones today at@BlackHatEvents BHUS2019. Also,@GXiling and@heisecode will talk about Exploiting Qualcomm WLAN and Modem Over The Air at 12:10pm-1:00pm tomorrow at@BlackHatEvents !pic.twitter.com/IGeGETSZMs
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This is the third talk accepted to
@BlackHatEvents by our team members and we are looking forward to share our research!https://twitter.com/BlackHatEvents/status/1131229523532505089 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Congratulations again! @DroidSec_cn
@Xbalien29@leonwxqian will be sharing their research on the Remote Exploitation of SQLite and Curl at#BHUSA 2019: https://www.blackhat.com/us-19/briefings/schedule/index.html#exploring-the-new-world--remote-exploitation-of-sqlite-and-curl-15726 … This is our third talk accepted to@BlackHatEvents and we are honored to have these opportunities!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Another talk by Blade members
@GXiling and@heisecode "Exploiting Qualcomm WLAN and Modem Over The Air" has been accepted at#BHUSA https://www.blackhat.com/us-19/briefings/schedule/index.html#exploiting-qualcomm-wlan-and-modem-over-the-air-15481 … Thank@BlackHatEvents for giving us another opportunity to share our research!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
More information about our research can be found in https://blade.tencent.com/ https://twitter.com/tencent_blade/status/1126673959884169216 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Excited to know that our team member
@GXiling will be speaking at@BlackHatEvents#BHUSA this August in Las Vegas. Great honor to have this opportunity! We will do a public analysis on how to remotely exploit the hardware decoder on smartphones: https://www.blackhat.com/us-19/briefings/schedule/index.html#bypassing-the-maginot-line-remotely-exploit-the-hardware-decoder-on-smartphone-14556 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A CVE ID in the Magellan has been assigned as CVE-2018-20346. We have updated the Vulnerability page to add a description of the specific affected area. Thanks to Google's quick response, the Magellan bonus is $10,337,one of the highest Chrome prize in public information in 2018.https://twitter.com/tencent_blade/status/1072436405350121473 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We have updated the vulnerability information page and we have contacted more vendor security teams to help them fix critical SQLite vulnerabilities in their products.https://twitter.com/tencent_blade/status/1072436405350121473 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Our team's security researcher
@leonwxqian discovered a SQLite remote code execution vulnerability. This vulnerability can be triggered remotely by accessing a web page, affecting all software that uses Chromium or SQLite. Details can be found at https://blade.tencent.com/magellan/index_en.html ….Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
#Pwn2Own The good news is that we have exploited Google Home, to successfully implement non-interactive code execution, and the bad news is that we won't be participating in Mobile Pwn2Own's new IoT competition this year. Looking forward to the game starting tomorrow.@thezdipic.twitter.com/dCKfdKHU8h
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
TenSec 2018 coming soon!https://twitter.com/keen_lab/status/1035524385501667328 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tencent Blade Team proslijedio/la je Tweet
Full slide and videos of <Breaking Smart Speakers: We are listening to you> of Amazon Echo on Defcon 26 by WuHuiyu & QianWenxiang , LiYuxiang could be found on Defcon Media Server: https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wu%20HuiYu%20and%20Qian%20Wenxiang/ … , the code could be found on Github:https://github.com/tencentbladeteam/Exploit-Amazon-Echo …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Members of Tencent Blade Team
@leonwxqian @DroidSec_cn speaking at@defcon More details coming soon!pic.twitter.com/LFKyAWUdrR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We will be speaking at DEFCON 101 Track today at 12:00. If you are interested in how to breaking the smart speakers, such as Amazon Echo, you must remember to come over.
@Xbalien29@leonwxqian @DroidSec_cn@defcon#DEFCONpic.twitter.com/WOBbUglKYM
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tencent Blade Team was founded by Tencent Security Platform Department, focusing on the study of AI, mobile internet, IoT and other cutting-edge technologies. In the future, we will continue to make the Internet a safer place for everyone.pic.twitter.com/mWaibcJL0D
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.