It was an honour to be invited to speak at @deepsec_cc 1st edition, where I met old friends and made new ones. Kudos to @WangTielei & team for making it happen 💪

Thrilled to hear this meant so much to you! ✨"Do the right and difficult things" – this is exactly why we build deepsec.cc. Thanks for bringing your brilliance to the community!
The best closed-door hacker conference I attended this year, where I met many old and new friends. We had a great time. Thank you very much to the organizers for preparing such a hacker feast for us in a downturn environment. Do the right and difficult things. @deepsec_cc




The best closed-door hacker conference I attended this year, where I met many old and new friends. We had a great time. Thank you very much to the organizers for preparing such a hacker feast for us in a downturn environment. Do the right and difficult things. @deepsec_cc




deepsec.cc 2025 | Shanghai Deep Security Closed-door Conference Share · Collide · Breakthrough From researchers. For researchers. 📍 Shanghai, China | 📅 June 16, 2025 🌐 deepsec.cc | 📧 [email protected]


#deepsec Two more talks on the way! "Banana Mail" by roadicing, 1wc and bxl turns a crafted email into a zero-click, persistent DoS for MacOS that survives reboots. "[redacted]" by [redacted]. 👉deepsec.cc
#deepsec Two new talks: "Surrogate Chaos" by Wang Nan presents a critical heap overflow bug in Facebook Hermes that enables React Native RCE. "Rooting Google Pixel with kernel MTE enabled in one shot" by @ThomasKing2014 gets Pixel kernel exec despite MTE. deepsec.cc
#deepsec Two talks from @DarkNavyOrg: "A Security Perspective on IM Attack Surfaces" reveals flaws enabling stealthy backdoors in WeChat. "Argusee: AI-Powered Multi-Agent System for Next-Gen Vulnerability Discovery" uses AI to uncover exploitable 0-days. deepsec.cc
#deepsec Session "Humble Mobile Forensics" by @jaakerblom will be [Redacted]. Also another session [Redacted] by [Redacted]. Only at deepsec.cc 😈
#deepsec Session "SPTM's Page Protection Battle Against Kernel R/W Attacks" by BGT examines Apple's secure page table monitor introduced in iOS 17, revealing how it defends against attacks from kernel read/write hackers. More at deepsec.cc
#deepsec Session "Exploiting the Next State of Communication with Zero-Interaction" by K.i.V.A. inspects [redacted] protocol and demonstrate how authentication bypass can be achieved without user interaction. More at deepsec.cc
#deepsec Session "Behind the Pixels: A Journey of Reverse Engineering and Fuzzing on Apple's Stacked Subsystem" by @keenjoy95 sheds light on IOMobileFrameBuffer and Apple Silicon graphics, revealing untold vulnerabilities and attack paths. More at deepsec.cc
#deepsec Session "Sending Me Your IOUserClients: A Bypass to Immovable Ports" by INT reveals how Apple's "immovable" IOUserClient ports were never truly secure, presenting a full mitigation bypass and exposing gaps in IPC defenses. 👉deepsec.cc
[Official Announcement]: deepsec.cc 2025 IS COMING!!! This is a community-driven, non-profit information security closed-door symposium, where technology speaks loudest. 🌐 deepsec.cc 📅 June 16, 2025 📍 Shanghai, China 📧 [email protected]
![deepsec_cc's tweet image. [Official Announcement]: deepsec.cc 2025 IS COMING!!!
This is a community-driven, non-profit information security closed-door symposium, where technology speaks loudest.
🌐 deepsec.cc
📅 June 16, 2025
📍 Shanghai, China
📧 x@deepsec.cc](https://pbs.twimg.com/media/GooMhLEXgAAXx9R.jpg)
United States Trends
- 1. Rickey 2,245 posts
- 2. Big Balls 20.5K posts
- 3. Waddle 3,197 posts
- 4. Westbrook 15.9K posts
- 5. Kings 155K posts
- 6. Maybe in California N/A
- 7. #TrumpsShutdownDragsOn 4,858 posts
- 8. Argentina 524K posts
- 9. Olave 2,796 posts
- 10. Meyers 2,334 posts
- 11. Voting Rights Act 23.2K posts
- 12. Hayley 5,205 posts
- 13. Gold Glove 7,979 posts
- 14. Justice Jackson 15.6K posts
- 15. Veo 3.1 5,133 posts
- 16. Kate McKinnon 1,036 posts
- 17. Josh Simmons N/A
- 18. annabeth 2,128 posts
- 19. Capitol Police 24.7K posts
- 20. Eggs 29K posts
Something went wrong.
Something went wrong.