|
You are here |
2019.www.torproject.org | ||
| | | | |
comsecuris.com
|
|
| | | | | [AI summary] This blog post discusses a detailed exploit chain targeting a mobile phone's application processor OS through a compromised modem. The author outlines the process of identifying vulnerabilities in the baseband firmware, reverse engineering the MT6795's cellular stack layers, and attempting to fuzz the MM layer for potential memory corruption issues. The post also touches on the challenges of creating a persistent rootkit via the modem and the importance of hardware isolation in securing mobile platforms. | |
| | | | |
freedom-to-tinker.com
|
|
| | | | | In this second installment of the "No Boundaries" series, we show how a long-known vulnerability in browsers' built-in password managers is abused by | |
| | | | |
blog.torproject.org
|
|
| | | | | In the past few years, a technique called browser fingerprinting has received a lot of attention because of the risks it can pose to privacy. What is it? How is it used? What is Tor Browser doing against it? In this blog post, I'm here to answer these questions. | |
| | | | |
hunt.io
|
|
| | | Learn how a Russian-speaking threat actor has evolved from impersonating EFF to now deploying Cloudflare-themed phishing with Telegram-based C2. | ||