Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Trend Micro
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Looking at the Attack Surfaces of the Kenwood DMX958XR IVI
November 21, 2024 | Connor Ford
CONTINUE READING
SUBSCRIBE
Blog post
MindshaRE: Variant Hunting with IDA Python
June 27, 2018
IDA
,
Python
,
MindshaRE
Blog post
Analyzing an Integer Overflow in Bitdefender AV: Part 2 – The Exploit
June 21, 2018
Research
,
Exploit
,
Bitdefender
Blog post
Analyzing an Integer Overflow in Bitdefender AV: Part 1 – The Vulnerability
June 19, 2018
Bitdefender
,
Research
,
Exploit
Blog post
The June 2018 Security Update Review
June 12, 2018
Security Patch
,
Adobe
,
Microsoft
Blog post
Down the Rabbit Hole - A Deep Dive into an attack on an RPC interface
June 07, 2018
Advantech
,
SCADA
,
Research
,
Exploit
Blog post
Malicious Intent using Adobe Acrobat's OCG setIntent
May 29, 2018
Research
,
Adobe
,
Acrobat
Blog post
MindshaRE: Walking the Windows Kernel with IDA Python
May 22, 2018
MindshaRE
,
IDA
,
Python
Blog post
It’s Time to Terminate the Terminator
May 15, 2018
VBScript
,
Research
,
Microsoft
Blog post
The May 2018 Security Update Review
May 08, 2018
Security Patch
,
Microsoft
,
Adobe
Blog post
Running with Scissors: The Dangers of Cutting and Pasting Sample Code
May 02, 2018
Research
,
JSON
keyboard_arrow_left
keyboard_arrow_right