bugscale's profile picture. Security Audits & Vulnerability Research

Bugscale

@bugscale

Security Audits & Vulnerability Research

Pinned

Check out our first blog post about V8 CVE-2024-12695: bugscale.ch/blog/dissectin…


Bugscale reposted

🐞 Bugscale is thrilled to be sponsoring Hexacon again and we look forward to seeing everyone in Paris! Thank you @bugscale for your continued support 🙏

hexacon_fr's tweet image. 🐞 Bugscale is thrilled to be sponsoring Hexacon again and we look forward to seeing everyone in Paris!

Thank you @bugscale for your continued support 🙏

Bugscale reposted

Here is a new blog post, where I wrote about (some of) my recent work with angr, including: - Adding support for Windows debug symbols - Collecting and visualizing real-time coverage - Improving debugging workflows plowsec.github.io/angr-introspec…


We're #hiring ! You can check out the job desc on our website: bugscale.ch/careers/ or you can also apply on LinkedIn: linkedin.com/jobs/view/3601…

bugscale.ch

Careers

Careers


Bugscale reposted

Highlights from #Pwn2Own Toronto Day 2: Team Bugscale vs the #HP printer


Bugscale reposted

Ph0wn is brought free to you thanks to our sponsors. We warmly thank our bronze sponsors :)

ph0wn's tweet image. Ph0wn is brought free to you thanks to our sponsors. We warmly thank our bronze sponsors :)

Bugscale reposted

In the first SOHO SMASHUP of the day, we have a unique + a known bug! #Pwn2Own #P2OToronto

thezdi's tweet image. In the first SOHO SMASHUP of the day, we have a unique + a known bug!  #Pwn2Own #P2OToronto
thezdi's tweet image. In the first SOHO SMASHUP of the day, we have a unique + a known bug!  #Pwn2Own #P2OToronto

Bugscale reposted

🔥 We are thrilled to announce our first sponsor! 🙏 Thank you @bugscale for helping us make this highly technical conference possible 🐞 To find out more about Bugscale: ➡️ bugscale.ch hexacon.fr/sponsors/ #HEXACON2022

hexacon_fr's tweet image. 🔥 We are thrilled to announce our first sponsor!

🙏 Thank you @bugscale for helping us make this highly technical conference possible

🐞 To find out more about Bugscale:
➡️ bugscale.ch

hexacon.fr/sponsors/

#HEXACON2022

Bugscale reposted

[TALK ANNOUNCEMENT] Automatically extracting static anti-virus signatures by Vladimir Meier (@PlowSec) insomnihack.ch/confirmed-spea… #INS22 #INSO22 #Talks


Bugscale reposted

Team Bugscale continues #Pwn2Own #AfterDark with a successful exploit of the LAN interface of the NETGEAR R6700 router. They combined an auth bypass and a command injection bug to earn $5,000 and 1 Master of Pwn point. #P2OAustin

thezdi's tweet image. Team Bugscale continues #Pwn2Own #AfterDark with a successful exploit of the LAN interface of the NETGEAR R6700 router. They combined an auth bypass and a command injection bug to earn $5,000 and 1 Master of Pwn point. #P2OAustin

Bugscale reposted

Success! The Bugscale team was able to take over a WD My Cloud Pro Series PR4100. They head off to the disclosure 'room' to provide the details of their demonstration. #Pwn2Own #P2OAustin


Bugscale reposted

Coming up next, the Bugscale team targets the Western Digital My Cloud Pro Series PR4100 in the NAS category. #Pwn2Own #P2OAustin


Bugscale reposted

Thanks to @bugscale to be Silver sponsor at BlackAlps BBQ 21! blackalps.ch/ba-21/

BlackAlpsConf's tweet image. Thanks to @bugscale to be Silver sponsor at BlackAlps BBQ 21!
blackalps.ch/ba-21/

Bugscale reposted

Success! The @bugscale team was able to demonstrate their RCE on the Western Digital NAS. They head off to the disclosure room to dish the details.


Looking forward to test our exploits! Hopefully we won't collide with anyone 😬

The schedule for #Pwn2Own Tokyo (Live from Toronto) is up! Our first attempt will be the team of @starlabs_sg, @hi_im_d4rkn3ss, @Puzzorsj and @c3xp1r targeting the NETGEAR Nighthawk R7800 router (LAN interface). Read all the details at zerodayinitiative.com/blog/2020/11/4…



Loading...

Something went wrong.


Something went wrong.