Summary

Total Articles Found: 2

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • Operation Triangulation: The last (hardware) mystery
  • CVE-2021-44228 vulnerability in Apache Log4j library

Operation Triangulation: The last (hardware) mystery

Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs.

...more

CVE-2021-44228 vulnerability in Apache Log4j library

The summary of the critical vulnerability CVE-2021-44228 in the Apache Log4j library, technical details and mitigations.

...more

end