social.tchncs.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
A friendly server from Germany – which tends to attract techy people, but welcomes everybody. This is one of the oldest Mastodon instances.

Administered by:

Server stats:

3.9K
active users

#googleprojectzero

0 posts0 participants0 posts today
Gnomer<p>I’m looking for a feed that aggregates recent reverse engineering and vulnerability centric security writeups, like the ones posted by Google project zero. I know there are many different security firms and academics that post these kind of articles now and then, but I’m having a hard time with discovery as every news site or feed I find is focused on cybersecurity threats and CVEs, or simply just malware actor reports. </p><p>Does anyone have something that fits the bill?<br><a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/googleprojectzero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>googleprojectzero</span></a> <a href="https://infosec.exchange/tags/projectzero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>projectzero</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/vulnerability_research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability_research</span></a></p>
apfeltalk :verified:<p>Sicherheitsupdate für Safari unterstützt ältere macOS-Versionen<br>Apple hat ein wichtiges Update für den Safari Webbrowser herausgegeben. Dieses Update zielt darauf ab, Nutzer:innen älterer macOS-Versionen vor aktuellen Sich<br><a href="https://www.apfeltalk.de/magazin/news/sicherheitsupdate-fuer-safari-unterstuetzt-aeltere-macos-versionen/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">apfeltalk.de/magazin/news/sich</span><span class="invisible">erheitsupdate-fuer-safari-unterstuetzt-aeltere-macos-versionen/</span></a><br><a href="https://creators.social/tags/Mac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mac</span></a> <a href="https://creators.social/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://creators.social/tags/MacOSMonterey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MacOSMonterey</span></a> <a href="https://creators.social/tags/MacOSVentura" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MacOSVentura</span></a> <a href="https://creators.social/tags/Softwareaktualisierung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Softwareaktualisierung</span></a> <a href="https://creators.social/tags/WebRTCSchwachstelle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebRTCSchwachstelle</span></a> <a href="https://creators.social/tags/IOS1677" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOS1677</span></a> <a href="https://creators.social/tags/NickGalloway" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NickGalloway</span></a> <a href="https://creators.social/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://creators.social/tags/GoogleProjectZero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoogleProjectZero</span></a> <a href="https://creators.social/tags/Safari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Safari</span></a> <a href="https://creators.social/tags/Sicherheitsupdate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitsupdate</span></a></p>
continue<p><strong>Project Zero - Mind the Gap</strong></p><p><a class="mention u-url" href="https://googleprojectzero.blogspot.com/2022/11/mind-the-gap.html" rel="nofollow noopener noreferrer" target="_blank">https://googleprojectzero.blogspot.com/2022/11/mind-the-gap.html</a></p> <p>Поучительная история как минимум о двух аспектах современной индустрии:</p> <ul><li>вендоры исправляют отрепорченные уязвимости очень "узко", не посмотрев нет ли проблемного кода вокруг:</li></ul><p></p> <blockquote>Inspired by the description of an in-the-wild vulnerability in low-level memory management code, fellow Project Zero researcher Jann Horn started auditing the ARM Mali GPU driver. Over the next three weeks, Jann found five more exploitable vulnerabilities (2325, 2327, 2331, 2333, 2334).</blockquote><p></p> <blockquote>One of these issues (2334) lead to kernel memory corruption, one (2331) lead to physical memory addresses being disclosed to userspace and the remaining three (2325, 2327, 2333) lead to a physical page use-after-free condition.</blockquote><p></p> <ul><li>производители конечных устройств просто не внедряют патчи в свои продукты:</li></ul><p></p> <blockquote>In this case we discovered that all of our test devices which used Mali are still vulnerable to these issues. CVE-2022-36449 is not mentioned in any downstream security bulletins.</blockquote><p></p> <blockquote>The vulnerabilities discussed in this blog post (CVE-2022-33917) are fixed by the upstream vendor, but at the time of publication, these fixes have not yet made it downstream to affected Android devices (including Pixel, Samsung, Xiaomi, Oppo and others). Devices with a Mali GPU are currently vulnerable.&nbsp;</blockquote><p><a class="mention u-url" href="https://honk.any-key.press/o/security" rel="nofollow noopener noreferrer" target="_blank">#security</a> <a class="mention u-url" href="https://honk.any-key.press/o/googleprojectzero" rel="nofollow noopener noreferrer" target="_blank">#googleprojectzero</a> <a class="mention u-url" href="https://honk.any-key.press/o/android" rel="nofollow noopener noreferrer" target="_blank">#android</a> <a class="mention u-url" href="https://honk.any-key.press/o/mali" rel="nofollow noopener noreferrer" target="_blank">#mali</a></p>
heise online (inoffiziell)Googles Project-Zero-Sicherheitsteam hat das erste halbe Jahr 2022 analysiert: 18 Zero-Day-Lücken haben Cyberkriminelle in freier Wildbahn missbraucht. <br><a href="https://www.heise.de/news/Im-ersten-Halbjahr-2022-bereits-18-Zero-Day-Luecken-ausgenutzt-7160091.html" rel="nofollow noopener noreferrer" target="_blank">Im ersten Halbjahr 2022 bereits 18 Zero-Day-Lücken ausgenutzt</a><br>
Tarnkappe.info<p>📬 Jailbreak für PS4 und PS5 schreitet voran<br /><a href="https://social.tchncs.de/tags/Gaming" class="mention hashtag" rel="tag">#<span>Gaming</span></a> <a href="https://social.tchncs.de/tags/Jailbreaks" class="mention hashtag" rel="tag">#<span>Jailbreaks</span></a> <a href="https://social.tchncs.de/tags/AndyNguyen" class="mention hashtag" rel="tag">#<span>AndyNguyen</span></a> <a href="https://social.tchncs.de/tags/GoogleProjectZero" class="mention hashtag" rel="tag">#<span>GoogleProjectZero</span></a> <a href="https://social.tchncs.de/tags/Jailbreak" class="mention hashtag" rel="tag">#<span>Jailbreak</span></a> <a href="https://social.tchncs.de/tags/KernalExploit" class="mention hashtag" rel="tag">#<span>KernalExploit</span></a> <a href="https://social.tchncs.de/tags/Sleirsgoevy" class="mention hashtag" rel="tag">#<span>Sleirsgoevy</span></a> <a href="https://social.tchncs.de/tags/TheFlow" class="mention hashtag" rel="tag">#<span>TheFlow</span></a> <a href="https://social.tchncs.de/tags/WebkitExploit" class="mention hashtag" rel="tag">#<span>WebkitExploit</span></a> <a href="https://tarnkappe.info/artikel/jailbreaks/jailbreak-fuer-ps4-und-ps5-schreitet-voran-243338.html" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">tarnkappe.info/artikel/jailbre</span><span class="invisible">aks/jailbreak-fuer-ps4-und-ps5-schreitet-voran-243338.html</span></a></p>
heise online (inoffiziell)Googles Project-Zero hat ausgewertet, wie sich die Hersteller beim Schließen von Sicherheitslücken schlagen. Sie sind deutlich schneller geworden. <br><a href="https://www.heise.de/news/Positiver-Trend-Hersteller-schliessen-Sicherheitsluecken-schneller-6457567.html" rel="nofollow noopener noreferrer" target="_blank">Positiver Trend: Hersteller schließen Sicherheitslücken schneller</a><br>
heise online (inoffiziell)Immer kleiner werdende Strukturen lassen die Reichweite des Rowhammer-Angriffs wachsen. Zudem reduzieren sie die Wirkung der Abwehrmaßnahmen. <a href="https://www.heise.de/news/Winzige-Chip-Strukturen-verschlimmern-Hardware-Angriff-Rowhammer-6056164.html" rel="nofollow noopener noreferrer" target="_blank">Winzige Chip-Strukturen verschlimmern Hardware-Angriff Rowhammer</a>
heise online (inoffiziell)Um mehr Zeit für Updates zu geben, wird Google gefundene Zero-Day-Lücken erst 30 Tage nach Update-Verfügbarkeit verraten. Bei akuter Gefahr kanns flotter gehen. <a href="https://www.heise.de/news/Googles-Project-Zero-wird-Sicherheitsluecken-verzoegert-veroeffentlichen-6019005.html" rel="nofollow noopener noreferrer" target="_blank">Googles Project Zero wird Sicherheitslücken verzögert veröffentlichen</a>
heise online (inoffiziell)Security-Experten des Internet-Riesen erkennen Software-Schwachstellen in immer wieder den gleichen Bereichen – und fordern eine bessere Grundabsicherung.<br> <a href="https://www.heise.de/hintergrund/Google-Hersteller-machen-es-Hackern-zu-leicht-5072550.html" rel="nofollow noopener noreferrer" target="_blank">Google: Hersteller machen es Hackern zu leicht</a>
ITSEC News<p>Windows Zero-Day Still Circulating After Faulty Fix - The LPE bug could allow an attacker to install programs; view, change, or delete data; or create n... <a href="https://threatpost.com/windows-zero-day-circulating-faulty-fix/162610/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/windows-zero-da</span><span class="invisible">y-circulating-faulty-fix/162610/</span></a> <a href="https://schleuss.online/tags/localprivilegeescalation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>localprivilegeescalation</span></a> <a href="https://schleuss.online/tags/googleprojectzero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>googleprojectzero</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a>-2020-17008 <a href="https://schleuss.online/tags/proofofconcept" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proofofconcept</span></a> <a href="https://schleuss.online/tags/windowszeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windowszeroday</span></a> <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a>-2020-0986 <a href="https://schleuss.online/tags/unpatched" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unpatched</span></a> <a href="https://schleuss.online/tags/badpatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>badpatch</span></a></p>
ITSEC News<p>iPhone Bug Allowed for Complete Device Takeover Over the Air - Researcher Ian Beer from Google Project Zero took six months to figure out the radio-proximity exp... <a href="https://threatpost.com/iphone-bug-takeover-over-the-air/161748/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/iphone-bug-take</span><span class="invisible">over-over-the-air/161748/</span></a> <a href="https://schleuss.online/tags/memorycorruptionbug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>memorycorruptionbug</span></a> <a href="https://schleuss.online/tags/googleprojectzero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>googleprojectzero</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/mobilesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobilesecurity</span></a> <a href="https://schleuss.online/tags/threatactors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatactors</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/wireless" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireless</span></a> <a href="https://schleuss.online/tags/ianbeer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ianbeer</span></a> <a href="https://schleuss.online/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> <a href="https://schleuss.online/tags/ipados" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipados</span></a> <a href="https://schleuss.online/tags/iphone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iphone</span></a> <a href="https://schleuss.online/tags/update" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>update</span></a> <a href="https://schleuss.online/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://schleuss.online/tags/radio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>radio</span></a> <a href="https://schleuss.online/tags/ipod" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipod</span></a> <a href="https://schleuss.online/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a></p>
heise online (inoffiziell)Ein Bug in iOS erlaubte es, Daten aus iPhones in Funkreichweite auszulesen – ohne Interaktion. Auch ein Wurm sei möglich gewesen, meint ein Sicherheitsforscher.<br><a href="https://www.heise.de/news/Exploit-uebernimmt-iPhones-in-der-Umgebung-Apple-Patch-liegt-vor-4977608.html" rel="nofollow noopener noreferrer" target="_blank">Exploit übernimmt iPhones in der Umgebung –&nbsp;Apple-Patch liegt vor</a><br>
ITSEC News<p>Facebook Messenger Bug Allows Spying on Android Users - The company patched a vulnerability that could connected video and audio calls without the knowled... <a href="https://threatpost.com/facebook-messenger-bug-spying-android/161435/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/facebook-messen</span><span class="invisible">ger-bug-spying-android/161435/</span></a> <a href="https://schleuss.online/tags/googleprojectzero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>googleprojectzero</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/mobilesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobilesecurity</span></a> <a href="https://schleuss.online/tags/mobiledevices" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobiledevices</span></a> <a href="https://schleuss.online/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://schleuss.online/tags/securitybug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securitybug</span></a> <a href="https://schleuss.online/tags/mobileapps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobileapps</span></a> <a href="https://schleuss.online/tags/videocalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>videocalls</span></a> <a href="https://schleuss.online/tags/voicecalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>voicecalls</span></a> <a href="https://schleuss.online/tags/messenger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>messenger</span></a> <a href="https://schleuss.online/tags/facebook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>facebook</span></a> <a href="https://schleuss.online/tags/android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>android</span></a> <a href="https://schleuss.online/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> <a href="https://schleuss.online/tags/spying" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spying</span></a> <a href="https://schleuss.online/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://schleuss.online/tags/flaw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>flaw</span></a></p>
ITSEC News<p>2 More Google Chrome Zero-Days Under Active Exploitation - Browser users are once again being asked to patch severe vulnerabilities that can lead to remote c... <a href="https://threatpost.com/2-zero-day-bugs-google-chrome/161160/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/2-zero-day-bugs</span><span class="invisible">-google-chrome/161160/</span></a> <a href="https://schleuss.online/tags/stablechannelrelease" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stablechannelrelease</span></a> <a href="https://schleuss.online/tags/remotecodeexecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>remotecodeexecution</span></a> <a href="https://schleuss.online/tags/activelyexploited" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>activelyexploited</span></a> <a href="https://schleuss.online/tags/googleprojectzero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>googleprojectzero</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/remoteattackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>remoteattackers</span></a> <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a>-2020-16013 <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a>-2020-16017 <a href="https://schleuss.online/tags/zerodayproject" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zerodayproject</span></a> <a href="https://schleuss.online/tags/securitybugs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securitybugs</span></a> <a href="https://schleuss.online/tags/websecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>websecurity</span></a> <a href="https://schleuss.online/tags/freetype" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freetype</span></a> <a href="https://schleuss.online/tags/zero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zero</span></a>-day <a href="https://schleuss.online/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a> <a href="https://schleuss.online/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://schleuss.online/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a> <a href="https://schleuss.online/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> <a href="https://schleuss.online/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://schleuss.online/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://schleuss.online/tags/patch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>patch</span></a> <a href="https://schleuss.online/tags/mac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mac</span></a></p>
heise online (inoffiziell)Gepatchte Sicherheitslücken sind der Hauptgrund dafür, dass man die gerade veröffentlichten Updates dringend einspielen sollte.<br><a href="https://www.heise.de/news/Apple-aktualisiert-auch-alte-iPhones-iPads-und-Watch-Geraete-4952446.html" rel="nofollow noopener noreferrer" target="_blank">Sicherheitslücken: Apple aktualisiert auch alte iPhones, iPads und Watch-Geräte</a><br>
ITSEC News<p>Apple Patches Bugs Tied to Previously Identified Zero-Days - The actively exploited vulnerabilities discovered by Project Zero exist across iPhone, iPad and iP... <a href="https://threatpost.com/apple-patches-bugs-zero-days/161010/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/apple-patches-b</span><span class="invisible">ugs-zero-days/161010/</span></a> <a href="https://schleuss.online/tags/zero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zero</span></a>-dayvulnerabilities <a href="https://schleuss.online/tags/googleprojectzero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>googleprojectzero</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/mobilesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobilesecurity</span></a> <a href="https://schleuss.online/tags/threatactors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatactors</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://schleuss.online/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> <a href="https://schleuss.online/tags/ipados" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipados</span></a> <a href="https://schleuss.online/tags/iphone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iphone</span></a> <a href="https://schleuss.online/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://schleuss.online/tags/ipod" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipod</span></a> <a href="https://schleuss.online/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a></p>
heise online (inoffiziell)Apple-Nutzer sollten ihr Betriebssystem zügig aktualisieren, kritische Lücken werden wohl für Angriffe verwendet. Nicht alle Systemversionen erhalten Updates.<br><a href="https://www.heise.de/news/Schwachstellen-in-iOS-werden-aktiv-ausgenutzt-kein-Update-fuer-iOS-13-4950496.html" rel="nofollow noopener noreferrer" target="_blank">Schwachstellen in iOS werden aktiv ausgenutzt – kein Update für iOS 13</a><br>
ITSEC News<p>Two Chrome Browser Updates Plugs Holes Actively Targeted by Exploits - Patches for both the Chrome desktop and Android browser address high-severity flaws with known exp... <a href="https://threatpost.com/chrome-holes-actively-targeted/160890/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/chrome-holes-ac</span><span class="invisible">tively-targeted/160890/</span></a> <a href="https://schleuss.online/tags/googlethreatanalysisgroup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>googlethreatanalysisgroup</span></a> <a href="https://schleuss.online/tags/remotecodeexecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>remotecodeexecution</span></a> <a href="https://schleuss.online/tags/securityresearchers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityresearchers</span></a> <a href="https://schleuss.online/tags/googleprojectzero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>googleprojectzero</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/mobilesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobilesecurity</span></a> <a href="https://schleuss.online/tags/securityupdate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityupdate</span></a> <a href="https://schleuss.online/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a> <a href="https://schleuss.online/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> <a href="https://schleuss.online/tags/zero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zero</span></a>-day <a href="https://schleuss.online/tags/android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>android</span></a> <a href="https://schleuss.online/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a> <a href="https://schleuss.online/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a> <a href="https://schleuss.online/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a></p>
heise online (inoffiziell)Das Sicherheitsteam hat das Risiko der gefundenen Schwachstelle für Entwickler als hoch eingestuft. Eine schnelle Lösung des Problems gibt es bisher nicht.<br><a href="https://www.heise.de/news/Googles-Project-Zero-deckt-Sicherheitsluecke-bei-GitHub-auf-4946535.html" rel="nofollow noopener noreferrer" target="_blank">Googles Project Zero deckt Sicherheitslücke bei GitHub auf</a><br>
ITSEC News<p>Unpatched Windows Zero-Day Exploited in the Wild for Sandbox Escape - Google Project Zero disclosed the bug before a patch becomes available from Microsoft. <a href="https://threatpost.com/unpatched-windows-zero-day-exploited-sandbox-escape/160828/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/unpatched-windo</span><span class="invisible">ws-zero-day-exploited-sandbox-escape/160828/</span></a> <a href="https://schleuss.online/tags/localprivilegeescalation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>localprivilegeescalation</span></a> <a href="https://schleuss.online/tags/securityvulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityvulnerability</span></a> <a href="https://schleuss.online/tags/googleprojectzero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>googleprojectzero</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> #7-daydisclosure <a href="https://schleuss.online/tags/bufferoverflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bufferoverflow</span></a> <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a>-2020-17087 <a href="https://schleuss.online/tags/proofofconcept" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proofofconcept</span></a> <a href="https://schleuss.online/tags/sandboxescape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sandboxescape</span></a> <a href="https://schleuss.online/tags/inthewild" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>inthewild</span></a> <a href="https://schleuss.online/tags/windows10" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows10</span></a> <a href="https://schleuss.online/tags/zero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zero</span></a>-day <a href="https://schleuss.online/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://schleuss.online/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://schleuss.online/tags/kernel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kernel</span></a> <a href="https://schleuss.online/tags/crash" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crash</span></a> <a href="https://schleuss.online/tags/ioctl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioctl</span></a> <a href="https://schleuss.online/tags/bug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bug</span></a></p>