Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
The December 2025 Security Update Review
December 09, 2025 | Dustin Childs
CONTINUE READING
SUBSCRIBE
Blog post
Pwn2Own Ireland 2025: Day Three and Master of Pwn
October 23, 2025
Pwn2Own
,
Samsung
,
Meta
,
WhatsApp
,
Canon
,
Lexmark
Blog post
Pwn2Own Ireland 2025 - Day Two Results
October 22, 2025
Pwn2Own
,
Samsung
,
Canon
,
Synology
Blog post
Pwn2Own Ireland 2025: The Full Schedule
October 20, 2025
Pwn2Own
,
WhatsApp
,
Samsung
,
QNAP
,
Synology
Blog post
MindshaRE: Using Binary Ninja API to Detect Potential Use-After-Free Vulnerabilities
March 27, 2025
MindshaRE
,
Binary Ninja
,
UAF
Blog post
Pwn2Own Ireland 2024: Day Two Results
October 23, 2024
Pwn2Own
,
Samsung
,
Canon
Blog post
MindShaRE: Decapping Chips for Electromagnetic Fault Injection (EMFI)
May 23, 2024
MindshaRE
,
Hardware
,
Research
Blog post
Pwn2Own Toronto 2023 - The Full Schedule
October 23, 2023
Pwn2Own
,
Synology
,
Western Digital
,
QNAP
,
Sonos
,
Xiaomi
,
Samsung
Blog post
Pwn2Own Toronto 2022 - Day Three Results
December 08, 2022
Samsung
,
Sonos
,
Pwn2Own
Blog post
MindShaRE: Analyzing BSD Kernels for Uninitialized Memory Disclosures using Binary Ninja
September 21, 2022
MindshaRE
,
NetBSD
,
Binary Ninja
Blog post
MindShaRE: When MySQL Cluster Encounters Taint Analysis
February 10, 2022
MindshaRE
,
MySQL
,
Taint Analysis
keyboard_arrow_left
keyboard_arrow_right