Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Trend Micro
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Looking at the Attack Surfaces of the Kenwood DMX958XR IVI
November 21, 2024 | Connor Ford
CONTINUE READING
SUBSCRIBE
Blog post
Using the Weblinks API to Reach JavaScript UAFs in Adobe Reader
February 06, 2019
Adobe
,
Acrobat
,
Research
Blog post
Implementing Fuzz Logics with Dharma
January 31, 2019
Dharma
,
Research
,
Foxit
,
Fuzzer
Blog post
Of ISOs and Attorneys: Legal Action in Vulnerability Disclosure
January 29, 2019
Program News
,
Disclosure
Blog post
The ZDI 2018 Retrospective
January 17, 2019
Retrospective
,
Stats
Blog post
Pwn2Own Vancouver 2019: Tesla, VMware, Microsoft, and More
January 14, 2019
Pwn2Own
,
Tesla
,
Microsoft
,
Google
,
Adobe
,
Apple
Blog post
The January 2019 Security Update Review
January 08, 2019
Microsoft
,
Adobe
,
Security Patch
Blog post
ZDI-18-1372 – The Elegant Bypass
December 21, 2018
Top 5
,
Adobe
,
Research
Blog post
Really Check Errors: Pointing to the Object of your Desire
December 20, 2018
Top 5
,
Apple
,
Research
Blog post
An Insincere Form of Flattery: Impersonating Users on Microsoft Exchange
December 19, 2018
Top 5
,
Exchange
,
Research
Blog post
Top 5 Day Two: Electron Boogaloo - A case for technodiversity
December 18, 2018
Top 5
,
Electron
,
Research
keyboard_arrow_left
keyboard_arrow_right