Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Using Large Language Models to Catch Vulnerabilities

Effective Fuzzing: A Dav1d Case Study

Shouldn't have happened: A vulnerability postmortem

Project Naptime: Evaluating Offensive Security Capabilities of Large Language Models

Driving forward in Android drivers

The Windows Registry Adventure - Part 1

First Handset with MTE on the Market

An analysis of an in-the-wild iOS Safari WebContent to GPU Process exploit

Analyzing a Modern In-the-wild Android Exploit

MTE As Implemented

MTE As Implemented, Part 1: Implementation Testing

Release of a Technical Report into Intel Trust Domain Extensions

Multiple Internet to Baseband Remote Code Execution Vulnerabilities in Exynos Modems

Exploiting null-dereferences in the Linux kernel

Exploiting CVE-2022-42703 - Bringing back the stack attack

Mind the Gap

Gregor Samsa: Exploiting Java's XML Signature Verification

RC4 Is Still Considered Harmful

The quantum state of Linux kernel garbage collection

2022 0-day In-the-Wild Exploitation…so far

The curious tale of a fake Carrier.app

An Autopsy on a Zombie In-the-Wild 0-day

Release of Technical Report into the AMD Security Processor

The More You Know, The More You Know You Don’t Know

FORCEDENTRY: Sandbox Escape

Racing against the clock – hitting a tiny kernel race window

A walk through Project Zero metrics

Zooming in on Zero-Click Exploits

A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution

This shouldn't have happened: A vulnerability postmortem

More →