Explore >> Select a destination


You are here

google.github.io
| | blog.impalabs.com
4.0 parsecs away

Travel
| | After an in-depth analysis of the NPU OS and its interaction with the Android kernel, this second part gives a more offensive outlook on this component. We will go through the main attack vectors to target it and detail two vulnerabilities that can be chained together to get code execution in the NPU from the NPU driver before pivoting back into the kernel.
| | insinuator.net
2.7 parsecs away

Travel
| | Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any nearby unauthenticated device. Bluetooth packets are processed by the Bluetooth chip (also called a controller), and then passed to the host (Android, Linux, etc.). Both, the firmware on ...
| | landave.io
3.7 parsecs away

Travel
| | Blog about anti-virus software vulnerabilities.
| | pentesterlab.com
11.9 parsecs away

Travel
| Learn hacking, code review, web security, and pentesting with our top research picks. Dive into remote code execution in Moodle, AI-attacks on Microsoft Copilot, and the true security of Telegram. Stay updated with AppSec eZine #550.