all InfoSec news
A Very Powerful Clipboard: Analysis of a Samsung in-the-wild exploit chain
Nov. 4, 2022, 3:50 p.m. | noreply@blogger.com (Google Project Zero)
Project Zero googleprojectzero.blogspot.com
Maddie Stone, Project Zero
Note: The three vulnerabilities discussed in this blog were all fixed in Samsung’s March 2021 release. They were fixed as CVE-2021-25337, CVE-2021-25369, CVE-2021-25370. To ensure your Samsung device is up-to-date under settings you can check that your device is running SMR Mar-2021 or later.
As defenders, in-the-wild exploit samples give us important insight into what attackers are really doing. We get the “ground truth” data about the vulnerabilities and exploit techniques they’re using, which then informs …
More from googleprojectzero.blogspot.com / Project Zero
First handset with MTE on the market
5 months, 3 weeks ago |
googleprojectzero.blogspot.com
Summary: MTE As Implemented
8 months, 3 weeks ago |
googleprojectzero.blogspot.com
MTE As Implemented, Part 1: Implementation Testing
8 months, 3 weeks ago |
googleprojectzero.blogspot.com
MTE As Implemented, Part 3: The Kernel
8 months, 3 weeks ago |
googleprojectzero.blogspot.com
MTE As Implemented, Part 2: Mitigation Case Studies
8 months, 3 weeks ago |
googleprojectzero.blogspot.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Regional Leader, Cyber Crisis Communications
@ Google | United Kingdom
Regional Intelligence Manager, Compliance, Safety and Risk Management
@ Google | London, UK
Senior Analyst, Endpoint Security
@ Scotiabank | Toronto, ON, CA, M1K5L1
Software Engineer, Security/Privacy, Google Cloud
@ Google | Bengaluru, Karnataka, India
Senior Security Engineer
@ Coinbase | Remote - USA