all InfoSec news
A Very Powerful Clipboard: Analysis of a Samsung in-the-wild exploit chain
Nov. 4, 2022, 3:50 p.m. | noreply@blogger.com (Google Project Zero)
Project Zero googleprojectzero.blogspot.com
Maddie Stone, Project Zero
Note: The three vulnerabilities discussed in this blog were all fixed in Samsung’s March 2021 release. They were fixed as CVE-2021-25337, CVE-2021-25369, CVE-2021-25370. To ensure your Samsung device is up-to-date under settings you can check that your device is running SMR Mar-2021 or later.
As defenders, in-the-wild exploit samples give us important insight into what attackers are really doing. We get the “ground truth” data about the vulnerabilities and exploit techniques they’re using, which then informs …
More from googleprojectzero.blogspot.com / Project Zero
First handset with MTE on the market
6 months, 4 weeks ago |
googleprojectzero.blogspot.com
Analyzing a Modern In-the-wild Android Exploit
8 months, 1 week ago |
googleprojectzero.blogspot.com
Summary: MTE As Implemented
9 months, 4 weeks ago |
googleprojectzero.blogspot.com
MTE As Implemented, Part 1: Implementation Testing
9 months, 4 weeks ago |
googleprojectzero.blogspot.com
MTE As Implemented, Part 3: The Kernel
9 months, 4 weeks ago |
googleprojectzero.blogspot.com
MTE As Implemented, Part 2: Mitigation Case Studies
9 months, 4 weeks ago |
googleprojectzero.blogspot.com
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Security Compliance Strategist
@ Grab | Petaling Jaya, Malaysia
Cloud Security Architect, Lead
@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)