dayzerosec's profile picture. Account for the day[0] podcast + media.

DAY[0]

@dayzerosec

Account for the day[0] podcast + media.

We have a special episode this week, where we interview @JohnCarse of @getsquarex. We talk about John's industry experience, history of browser security, and the work SquareX is doing on detecting and mitigating browser-based attacks. Check it out: youtube.com/watch?v=GtFpxB…

dayzerosec's tweet card. 281 - Mitigating Browser Hacking - Interview with John Carse (SquareX...

youtube.com

YouTube

281 - Mitigating Browser Hacking - Interview with John Carse (SquareX...


DAY[0] hat repostet

IT'S NEWSLETTER DAY 📰 New information about Apple Exclaves @dayzerosec drops some Hypervisor RE Representing type lattices capactly from @tekknolagi @XenoKovah clarifies the ESP32 "backdoor" + Jobs and MORE 👇 blog.exploits.club/exploits-club-…


DAY[0] hat repostet

I've published a write-up on reversing and analyzing Samsung's H-Arx hypervisor architecture for Exynos devices, which has had a lot of changes in recent years and pretty interesting design. Hope you all enjoy :) dayzerosec.com/blog/2025/03/0…


DAY[0] hat repostet

Recon Training 23-26 June 2025: KVM to Mobile Security Platforms - Attacking Hypervisors with @SpecterDev and zi from @dayzerosec (4 days) For more details recon.cx/2025/trainingF…


DAY[0] hat repostet

My @dayzerosec co-host zi and I are giving our 1st training @ hardwear.io with a focus on attacking security hypervisors! Trainings are something we've wanted to do for a while. Take a look and share to those who would be interested :) hardwear.io/usa-2025/train…


But open source was supposed to keep us safe!?

The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the latest updates today.



I am once again beginning my search for cool hacks and security research for this weeks podcast. Come stop in and share your content or just hang out at twitch.tv/dayzerosec?_=2… ~zi


What a surprise, I'm going live again to prepare for this weeks podcast. Stop by and get a preview of this week's security research, ask questions or just hang out. twitch.tv/dayzerosec


Lets take a quick look at some more security research from the past week...going live in a few minutes to start going over podcast topics.Feel free to drop by with any links or just to ask questions. twitch.tv/dayzerosec


Hopefully we've got some fun hacks and vulns to take a look at this week. I'll be going live in a few minutes to start looking at topics for this weeks podcast episodes. twitch.tv/dayzerosec


Another week of security research to checkout on stream. Going live in a few minutes, stop by for a preview of the upcoming episode, or just to ask questions and share cool research. twitch.tv/dayzerosec


I'm going live again with another stream checking out vuln disclosures and research from the last week as I get topics together for this week's episodes. twitch.tv/dayzerosec


I'm (zi) going live with a casual stream just going over research and posts from the last week to get topics ready for this week's episode. twitch.tv/dayzerosec


DAY[0] hat repostet

Our first newslettter is live! Feel free to check it out, and subscribe for weekly vuln research and exploit development resources delivered right to your inbox: blog.exploits.club/vuln-research-…


Going live in 5 minutes with our late edition of the binary episode for the podcast this week. Today we have RetSpill, a Safari vuln, libqcloud, and an RCE in Steam. twitch.tv/dayzerosec


There won't be any podcast episodes this week. We will be back next week.


In 10 minutes the binary episode begins, this week featuring Samsung issues! twitch.tv/dayzerosec


We're going live with our bounty episode of the week in a few minutes. This week has some cookie-based bugs, extracting GPT training data, a macOS TCC bypass, and more. Live on Twitch: twitch.tv/dayzerosec


Loading...

Something went wrong.


Something went wrong.