Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Trend Micro
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Looking at the Attack Surfaces of the Kenwood DMX958XR IVI
November 21, 2024 | Connor Ford
CONTINUE READING
SUBSCRIBE
Blog post
How a Deceptive Assert Caused a Critical Windows Kernel Vulnerability
May 07, 2020
Windows
,
Microsoft
,
Research
Blog post
Pwn2Own Day Two – Results and Master of Pwn
March 20, 2020
Pwn2Own
,
Windows
,
Oracle
,
Adobe
,
VMware
Blog post
Privilege Escalation Via the Core Shell COM Registrar Object
December 20, 2019
Top 5
,
Windows
,
Research
Blog post
Local Privilege Escalation in Win32k.sys Through Indexed Color Palettes
December 17, 2019
Top 5
,
Windows
,
Research
Blog post
Thanksgiving Treat: Easy-as-Pie Windows 7 Secure Desktop Escalation of Privilege
November 19, 2019
Microsoft
,
Windows
,
Research
,
UAC
Blog post
CVE-2019-0726: An RCE Vulnerability in the Windows 10 DHCP Client
April 25, 2019
Microsoft
,
Windows
,
Research
keyboard_arrow_left
keyboard_arrow_right