March 28, 2024, 8 a.m. | Yves Bieri

Compass Security Blog blog.compass-security.com

In this fourth part of the series, we analyze the memory corruption identified previously and manage to overwrite the program pointer!

analysis corruption internet of things manage memory memory corruption program pwn2own pwn2own toronto 2023 research series toronto write-up

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Associate Principal Security Engineer

@ Activision Blizzard | Work from Home - CA

Security Engineer- Systems Integration

@ Meta | Bellevue, WA | Menlo Park, CA | New York City

Lead Security Engineer (Digital Forensic and IR Analyst)

@ Blue Yonder | Hyderabad

Senior Principal IAM Engineering Program Manager Cybersecurity

@ Providence | Redmond, WA, United States

Information Security Analyst II or III

@ Entergy | The Woodlands, Texas, United States