Article: Blind Return Oriented Programming (BROP) Attack - published almost 10 years ago. Content: submitted by /u/turnersr [link] [comments] https://www.reddit.com/r/vrd/comments/2u7wxo/blind_return_oriented_programming_brop_attack/ Published: 2015 01 30 18:06:05 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
Article: Apple updates iOS, OS X and Apple TV in monster patch release - published almost 10 years ago. Content: http://www.livehacking.com/2015/01/28/apple-updates-ios-os-x-and-apple-tv/ Published: 2015 01 28 12:56:01 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: Google discloses three more zero-day vulnerabilities, this time for OS X - published almost 10 years ago. Content: http://www.livehacking.com/2015/01/23/google-discloses-three-more-zero-day-vulnerabilities-this-time-for-os-x/ Published: 2015 01 23 07:45:27 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: Oracle Critical Patch Update Advisory - January 2015
- published about 10 years ago. Content: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html Published: 2015 01 20 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines by Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, and Sotiris Ioannidis [PDF] - published about 10 years ago. Content: submitted by /u/turnersr [link] [comments] https://www.reddit.com/r/vrd/comments/2sppvi/the_devil_is_in_the_constants_bypassing_defenses/ Published: 2015 01 17 06:44:33 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
|
Article: Preventing Use-after-free with Dangling Pointers Nullification by Byoungyoung Lee, Chengyu Song, Yeongjin Jang, and Tielei Wang [PDF] - published about 10 years ago. Content: submitted by /u/turnersr [link] [comments] https://www.reddit.com/r/vrd/comments/2sppt4/preventing_useafterfree_with_dangling_pointers/ Published: 2015 01 17 06:43:25 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
|
Article: Hacking freemium games - the evolution of PC game cheating - published about 10 years ago. Content: This post is going to be a rather strange post compared to previous ones. But bear with me, in the middle of the post you will see why this post fits the IT security topic. I'm also terribly sorry for not posting recently, but I was busy with my SPSE and SLAE certification. Both are recommended for Python and Assembly noobs like me. But back to this post... https://jumpespjump.blogspot.com/2015/01/hacking-freemium-games-evolution-of-pc.html Published: 2015 01 14 19:47:00 Received: 2024 03 12 23:22:34 Feed: Jump ESP, jump! Source: Jump ESP, jump! Category: Cyber Security Topic: Cyber Security |
Article: Microsoft to fix Windows vulnerability that Google publicly disclosed last week - published about 10 years ago. Content: http://www.livehacking.com/2015/01/13/microsoft-to-fix-windows-vulnerability-that-google-publicly-disclosed-last-week/ Published: 2015 01 13 07:43:54 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
Article: How I Evolved your Fuzzer: Techniques for Black-Box Evolutionary Fuzzing by Fabien Duchene [PDF] - published about 10 years ago. Content: submitted by /u/turnersr [link] [comments]... https://www.reddit.com/r/vrd/comments/2s812x/how_i_evolved_your_fuzzer_techniques_for_blackbox/ Published: 2015 01 12 23:55:46 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
|
Article: Video archives of security conferences and workshops - published about 10 years ago. Content: Just some links for your enjoyment List of security conferences in 2014 Video archives: AIDE (Appalachian Institute of Digital Evidence) 2013 2012 2011 Blackhat 2012 or 2012 torrent Botconf 2013 Bsides BSides DC 2014 BSides Chicago 2014 BSides Nashville 2014 BSides Augusta 2014 BSides Huntsville 2014 BSides Las Vegas 2014 BSidesDE 2013 BSid... https://contagiodump.blogspot.com/2015/01/video-archives-of-security-conferences.html Published: 2015 01 05 04:11:00 Received: 2024 03 13 18:00:19 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor