|
You are here |
team-atlanta.github.io | ||
| | | | |
vit.baisa.cz
|
|
| | | | | A personal blog and a digital garden of Vít Baisa | |
| | | | |
blog.quarkslab.com
|
|
| | | | | Following our presentation at Black Hat USA, in this blog post we provide some details on CVE-2022-20233, the latest vulnerability we found on Titan M, and how we exploited it to obtain code execution on the chip. | |
| | | | |
blog.thalium.re
|
|
| | | | | [AI summary] The blog post discusses the author's experience in vulnerability research and exploitation targeting Steam and its related products, including Steam Link and Remote Play. It covers various vulnerabilities such as format string vulnerabilities, request forgery, heap overflows, and a remote code execution (RCE) exploit. The author also details their interactions with HackerOne and Valve, highlighting the challenges in getting timely responses and the eventual resolution of the reported issues. | |
| | | | |
www.sonatype.com
|
|
| | | Discover how the Rust programming language addresses critical software challenges with memory safety and high performance, reshaping software development. | ||