Explore >> Select a destination


You are here

2019.www.torproject.org
| | www.cyber-risk-gmbh.com
4.0 parsecs away

Travel
| | Cyber risk and the Board of Directors - The Board must assess cybersecurity risks, challenge security plans, and evaluate policies and solutions
| | comsecuris.com
3.6 parsecs away

Travel
| | [AI summary] This blog post discusses a detailed exploit chain targeting a mobile phone's application processor OS through a compromised modem. The author outlines the process of identifying vulnerabilities in the baseband firmware, reverse engineering the MT6795's cellular stack layers, and attempting to fuzz the MM layer for potential memory corruption issues. The post also touches on the challenges of creating a persistent rootkit via the modem and the importance of hardware isolation in securing mobile platforms.
| | freedom-to-tinker.com
4.2 parsecs away

Travel
| | In this second installment of the "No Boundaries" series, we show how a long-known vulnerability in browsers' built-in password managers is abused by
| | thehacker.news
17.6 parsecs away

Travel
| Join the conversation with industry leaders to explore how GenAI and LLMs are reshaping business operations.