Explore >> Select a destination


You are here

blog.xyz.is
| | insinuator.net
6.0 parsecs away

Travel
| | Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any nearby unauthenticated device. Bluetooth packets are processed by the Bluetooth chip (also called a controller), and then passed to the host (Android, Linux, etc.). Both, the firmware on ...
| | blog.quarkslab.com
4.6 parsecs away

Travel
| | Following our presentation at Black Hat USA, in this blog post we provide some details on CVE-2022-20233, the latest vulnerability we found on Titan M, and how we exploited it to obtain code execution on the chip.
| | mdanilor.github.io
8.1 parsecs away

Travel
| | What features are in place to protect your system from memory corruption? And how to bypass them?
| | blog.qasource.com
26.0 parsecs away

Travel
| Read this blog to understand the most important trends in network penetration testing in improving security and why to partner with QASource.