Tencent Blade Team

@tencent_blade

A security research team from Tencent Security Platform Department.

Vrijeme pridruživanja: veljača 2018.

Tweetovi

Blokirali ste korisnika/cu @tencent_blade

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @tencent_blade

  1. 23. pro 2019.

    No need to worry: SQLite and Google have already confirmed and fixed it and we are helping other vendors through it too. We haven't found any proof of wild abuse of Magellan 2.0 and will not disclose any details now. Feel free to contact us if you had any technical questions!

    Poništi
  2. 23. pro 2019.

    Magellan 2.0 on its way! Blade researcher found another set of vulnerabilities in which can result in remote code execution via WebSQL, leaking program memory or possible program crashes. More Q&As can be found at

    Poništi
  3. 19. ruj 2019.

    CVE-2019-14835 is assigned for this issue.

    Poništi
  4. 18. ruj 2019.

    We've decided to name this vulnerability as V-gHost. Details can be found at page

    Poništi
  5. 18. ruj 2019.

    Tencent Blade Team recently discovered a QEMU-KVM VM escape vulnerability that exists in vhost/vhost-net host linux kernel module. Attackers can trigger this bug from VM with priviledge account of the VM during the VM migration.

    Poništi
  6. 7. kol 2019.

    Our researcher talking about how to remotely exploit the hardware decoder on smartphones today at BHUS2019. Also, and will talk about Exploiting Qualcomm WLAN and Modem Over The Air at 12:10pm-1:00pm tomorrow at

    Poništi
  7. 22. svi 2019.

    This is the third talk accepted to by our team members and we are looking forward to share our research!

    Poništi
  8. 16. svi 2019.

    Congratulations again! @DroidSec_cn will be sharing their research on the Remote Exploitation of SQLite and Curl at 2019: This is our third talk accepted to and we are honored to have these opportunities!

    Poništi
  9. 14. svi 2019.

    Another talk by Blade members and "Exploiting Qualcomm WLAN and Modem Over The Air" has been accepted at Thank for giving us another opportunity to share our research!

    Poništi
  10. 9. svi 2019.
    Poništi
  11. 9. svi 2019.

    Excited to know that our team member will be speaking at this August in Las Vegas. Great honor to have this opportunity! We will do a public analysis on how to remotely exploit the hardware decoder on smartphones:

    Poništi
  12. 26. pro 2018.

    A CVE ID in the Magellan has been assigned as CVE-2018-20346. We have updated the Vulnerability page to add a description of the specific affected area. Thanks to Google's quick response, the Magellan bonus is $10,337,one of the highest Chrome prize in public information in 2018.

    Prikaži ovu nit
    Poništi
  13. 17. pro 2018.

    We have updated the vulnerability information page and we have contacted more vendor security teams to help them fix critical SQLite vulnerabilities in their products.

    Poništi
  14. 11. pro 2018.

    Our team's security researcher discovered a SQLite remote code execution vulnerability. This vulnerability can be triggered remotely by accessing a web page, affecting all software that uses Chromium or SQLite. Details can be found at .

    Poništi
  15. 12. stu 2018.

    The good news is that we have exploited Google Home, to successfully implement non-interactive code execution, and the bad news is that we won't be participating in Mobile Pwn2Own's new IoT competition this year. Looking forward to the game starting tomorrow.

    Poništi
  16. 31. kol 2018.
    Poništi
  17. proslijedio/la je Tweet
    12. kol 2018.

    Full slide and videos of <Breaking Smart Speakers: We are listening to you> of Amazon Echo on Defcon 26 by WuHuiyu & QianWenxiang , LiYuxiang could be found on Defcon Media Server: , the code could be found on Github:

    Prikaži ovu nit
    Poništi
  18. 12. kol 2018.

    Members of Tencent Blade Team @DroidSec_cn speaking at More details coming soon!

    Poništi
  19. 12. kol 2018.

    We will be speaking at DEFCON 101 Track today at 12:00. If you are interested in how to breaking the smart speakers, such as Amazon Echo, you must remember to come over. @DroidSec_cn

    Poništi
  20. 6. kol 2018.

    Tencent Blade Team was founded by Tencent Security Platform Department, focusing on the study of AI, mobile internet, IoT and other cutting-edge technologies. In the future, we will continue to make the Internet a safer place for everyone.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·