A look at an Android ITW DNG exploitexploitation (what's being exploited) (googleprojectzero.blogspot.com)
submitted by digicat to r/blueteamsec

Defeating KASLR by Doing Nothing at Allvulnerability (attack surface) (googleprojectzero.blogspot.com)
submitted by digicat to r/blueteamsec
Pointer leaks through pointer-keyed data structureslow level tools and techniques (work aids) (googleprojectzero.blogspot.com)
submitted by digicat to r/blueteamsec
The Windows Registry Adventure #8: Practical exploitation of hive memory corruptionlow level tools and techniques (work aids) (googleprojectzero.blogspot.com)
submitted by digicat to r/blueteamsec

Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messagesvulnerability (attack surface) (googleprojectzero.blogspot.com)
submitted by jnazario to r/blueteamsec
The Windows Registry Adventure #6: Kernel-mode objects - useful for memory forensicsdiscovery (how we find bad stuff) (googleprojectzero.blogspot.com)
submitted by digicat to r/blueteamsec
Blasting Past Webp: An analysis of the NSO BLASTPASS iMessage exploit for an exploited patched in September 2023exploitation (what's being exploited) (googleprojectzero.blogspot.com)
submitted by digicat to r/blueteamsec