October 4, 2023 at 10:44AM

■■■■■ Competing in Pwn2Own ICS 2022 Miami: Exploiting a zero click remote memory corruption in ICONICS Genesis64. https://doar-e.github.io/blog/2023/05/05/competing-in-pwn2own-ics-2022-miami-exploiting-a-zero-click-remote-memory-corruption-in-iconics-genesis64/ https://t.me/cKure/12954

October 2, 2023 at 04:11PM

■■■■□ A new Chrome zero-day is sending the Internet into a new chapter of Groundhog Day. https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software/ https://t.me/cKure/12952

October 2, 2023 at 03:07PM

■■■□□ Zero-Day: Discovered by X. B. of the Cisco Advanced Security Initiatives Group (ASIG), this medium-severity security flaw (CVE-2023-20109) stems from inadequate attribute validation within the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. https://www.bleepingcomputer.com/news/security/cisco-urges-admins-to-fix-ios-software-zero-day-exploited-in-attacks/ https://t.me/cKure/12951

September 28, 2023 at 03:35PM

■■□□□ CrowdStrike’s Advanced Memory Scanning Stops Threat Actor Using BRc4 at Telecommunications Customer. https://www.crowdstrike.com/blog/crowdstrikes-advanced-memory-scanning-stops-threat-actor/ https://t.me/cKure/12947