Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Trend Micro
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
MindshaRE: Using Binary Ninja API to Detect Potential Use-After-Free Vulnerabilities
March 27, 2025 | Reno Robert
CONTINUE READING
SUBSCRIBE
Blog post
The September 2018 Security Update Review
September 11, 2018
Adobe
,
Microsoft
,
Security Patch
Blog post
Voicemail Vandalism: Getting Remote Code Execution on Microsoft Exchange Server
August 14, 2018
Exploit
,
Microsoft
,
Exchange
Blog post
The August 2018 Security Update Review
August 14, 2018
Adobe
,
Microsoft
,
Security Patch
Blog post
The July 2018 Security Update Review
July 10, 2018
Microsoft
,
Adobe
,
Security Patch
Blog post
The June 2018 Security Update Review
June 12, 2018
Security Patch
,
Adobe
,
Microsoft
Blog post
It’s Time to Terminate the Terminator
May 15, 2018
VBScript
,
Research
,
Microsoft
Blog post
The May 2018 Security Update Review
May 08, 2018
Security Patch
,
Microsoft
,
Adobe
Blog post
The April 2018 Security Update Review
April 10, 2018
Microsoft
,
Apple
,
Adobe
,
Security Patch
Blog post
Pwn2Own 2018 – Day Two Results and Master of Pwn
March 16, 2018
Pwn2Own
,
Apple
,
Mozilla
,
Microsoft
Blog post
Pwn2Own 2018: Results from Day One
March 15, 2018
Microsoft
,
Oracle
,
Pwn2Own
,
Apple
keyboard_arrow_left
keyboard_arrow_right