ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು & ಪ್ರತಿಕ್ರಿಯೆಗಳು
- ಮಾಧ್ಯಮ
@scarybeasts ತಡೆಹಿಡಿಯಲಾಗಿದೆ
ನೀವು ಖಚಿತವಾಗಿಯೂ ಈ ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡಲು ಬಯಸುವಿರಾ? ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡುವುದು @scarybeasts ಅವರನ್ನು ತಡೆತೆರವುಗೊಳಿಸುವುದಿಲ್ಲ.
-
Project Zero exploit for iOS 10.1.1 by Ian Beer: https://bugs.chromium.org/p/project-zero/issues/detail?id=965#c2 …
-
This is why you should be using "apt-transport-tor" and "apt-transport-https" instead of plain APT.
#CVE20161252 Plain HTTP must die!pic.twitter.com/HNXKTw4g3U
-
Reliably compromising Ubuntu desktops by attacking the crash reporter https://donncha.is/2016/12/compromising-ubuntu-desktop/ …pic.twitter.com/ArLWXqhSC5
-
Very excited to welcome
@lokihardt to the Project Zero research team! -
[0day] [exploit] Fedora tracker + Google Chrome combo finally demoed super dangerous. Just the SNES exploit video:https://goo.gl/9gGG01
-
LOL! Had to update the SNES blog post because I named the wrong processor. Emulation error is in SPC700 audio co-processor, not main 5A222!
-
Most fun exploit I ever wrote: [0day] [exploit] Redux: compromising Linux using SNES Ricoh 5A22 processor opcodes?! https://goo.gl/bwNwm2
-
My write up of ten vulnerabilities in McAfee AV for Linux (including remote code execution as root) is online - https://nation.state.actor/mcafee.html
-
Later this week we’ll release an exploit for some of the bugs fixed today giving you a root shell and kernel memory access.
-
[1days] [0days] [PoCs] More gstreamer FLIC / vmnc issues: https://goo.gl/q9o0XM
-
[1day] [PoC with
$rip] Deterministic Linux heap grooming with huge allocations: https://goo.gl/J1Be6M -
Google Project Zero is really kicking ass. Read a full Android privesc exploit from new team member
@laginimaineb: https://goo.gl/I0jfv6 -
You gotta love the effort Google donates to industry-wide security initiatives. New OSS-Fuzz initiative:https://goo.gl/Qvzymf
-
Project Zero blog: "Breaking the Chain" by
@tiraniddo - https://goo.gl/LFt4pz -
Chris Evans ಹಿಂಬಾಲಿಸಿದ್ದಾರೆ Donncha O'Cearbhaill, laginimaineb ಮತ್ತು Michele Spagnuolo
-
@DonnchaC
Pronounced Done-a-ka - Passionate about human rights - InfoSec - Privacy - PGP: 0x3B0D706A7FBFED86
-
-
Oooops.... incorrect fix for my FLIC exploit. So a new post: [0day] [PoC] Incorrect fix for gstreamer FLIC decoder: https://goo.gl/rppt3d
-
Hardest exploit I ever wrote: [0day][exploit] Advancing exploitation: scriptless 0day exploit against Linux desktops https://goo.gl/6tKeoS
-
@ch3root@rygorous@FioraAeterna@Jonathan_Blow First GCC opt treating signed overflow as UB was committed in 1992 (loop.c r2178) -
.
@scarybeasts@HaifeiLi blogged about a Windows attack vector abusing this Chrome feat. https://justhaifei1.blogspot.hu/2015/10/watch-your-downloads-risk-of-auto.html … < Another reason to disable -
Sebastian Dröge ಗೆ ಪ್ರತ್ಯುತ್ತರವಾಗಿ
.
@sdroege_@bilboed The 0day in my new post, https://goo.gl/3FOMdC , is a vmnc issue that does affect latest gstreamer. I'll look more.
ಲೋಡಿಂಗ್ ಸಮಯ ಸ್ವಲ್ಪ ತೆಗೆದುಕೊಳ್ಳುತ್ತಿರುವಂತೆನಿಸುತ್ತದೆ.
Twitter ಸಾಮರ್ಥ್ಯ ಮೀರಿರಬಹುದು ಅಥವಾ ಕ್ಷಣಿಕವಾದ ತೊಂದರೆಯನ್ನು ಅನುಭವಿಸುತ್ತಿರಬಹುದು. ಮತ್ತೆ ಪ್ರಯತ್ನಿಸಿ ಅಥವಾ ಹೆಚ್ಚಿನ ಮಾಹಿತಿಗೆ Twitter ಸ್ಥಿತಿಗೆ ಭೇಟಿ ನೀಡಿ.
Ben Hawkes
Nima Fatemi
Donncha O'Cearbhaill
Chris Evans
Andrew Fasano
Krister Walfridsson
buherator