#kernelsecurity 搜尋結果
Diving into reverse engineering & kernel security! Installed tools for: - Base System/Dev Essentials - Kernel Dev & Building - Debugging/Tracing - Virtualization (QEMU/KVM) - Fuzzing/Exploit Tools Mastering C, Asm & more. Tips are welcomed #ReverseEngineering #KernelSecurity


Good and interesting presentation by Joe Bialek: Pointer Problems – Why We’re Refactoring the Windows Kernel: youtube.com/watch?v=-3jxVI… #microsoft #windows #kernelsecurity #programming

@silviocesare at @BSidesPer talking on bugs on open source code. #bughuntin #kernelsecurity #intergeroverflow

🚨 New Blog Post: Exploiting CVE-2024-0582 via the Dirty Page Table Method! Discover how dangling pages can corrupt Page Table Entries (PTEs) and redirect user-space memory to kernel-space. Read the full analysis: kuzey.rs/posts/Dirty_Pa… #ExploitDevelopment #KernelSecurity
#KASLR #KernelSecurity #macOS SysBumps: A Groundbreaking KASLR Break Attack Targeting Apple Silicon macOS Devices cysecurity.news/2025/01/sysbum…

#Kernelsecurity is a key determinant of overall system #security - If the kernel is not properly secured, nothing on your system is! Learn how to secure the #Linuxkernel & protect your system from #malware & other exploits: linuxsecurity.com/features/featu… #Linux @linuxfoundation @sjvn

#KernelSecurity - exploiting a kernel NULL dereference (2) http://j.mp/beBaXW
Memory mapping and kernel address space manipulation are still viable attack vectors. Defense must evolve. Full blog: versprite.com/blog/the-shell… #MemoryForensics #KernelSecurity #CyberDefens
#KernelSecurity #NULL Pointer Dereference in C Programming Language (1) http://j.mp/caFMjZ
🔧Mitigating BYOVD Attacks: Protect Your Kernel! 🔧 🚀 Master advanced exploit defenses—enroll in our MED course 👉darkrelay.com/courses/master… #CyberSecurity #BYOVD #KernelSecurity #ExploitDevelopment #MED #ThreatIntelligence #CyberDefense #InfoSec #StaySecure




KernelCare now supported in our VPS and Dedicated Servers offer #kernelsecurity #kernelupdate #kernelcare #vps flexihost.io/blog/kernelcar…

Critical vulnerabilities found in Windows Kernel Streaming (KS) beyond MSKSSRV driver, allowing exploits like Windows 11 at Pwn2Own Vancouver 2024. Attackers exploited logical flaws & bypassed validation checks. 🖥️ #MicrosoftWindows #KernelSecurity ift.tt/Ior0L7A
🛠️ Harden your Linux kernel by applying sysctl settings such as disabling ICMP redirects and source routing: net.ipv4.conf.all.accept_redirects = 0 #Ethereum #KernelSecurity
Modern kernel privilege escalation attacks have shifted to stealthy data-only methods bypassing Control Flow Integrity. VED defense system counters threats with integrity measures like shadow data tracking and slab poisoning to strengthen kernel #KernelSecurity #DataExploits
🔒 New on arXiv! Discover "SafeBPF: Hardware-assisted Defense-in-depth for eBPF Kernel Extensions" - a groundbreaking approach to enhancing eBPF framework safety. Learn how SafeBPF isolates programs to prevent vulnerabilities: bit.ly/3XlaFbn #eBPF #kernelsecurity
People think security is about defense. I believe it's about understanding. And understanding is the purest form of love. 🛡️ "Loving is understanding, Security is the subset of loving." — Seeker (李标明) #Infosec #KernelSecurity #Quote #哲学安全 #澄明之路
Protects against stealthy persistence and privilege escalation Requires advanced telemetry (e.g., from EDRs or kernel sensors) SOC teams rely on this for deep visibility into stealthy threats that operate below the radar. #KernelSecurity #RootkitDetection #AdvancedThreats
🖥️ Kernel and Bootkits: Kernel-Level Rootkits: They manipulate OS kernels to stay hidden and avoid detection. Bootkits: Infect the boot process to control the system before the OS loads, even bypassing encryption. #KernelSecurity #Bootkits
2/13 Beware of kernel vulnerabilities! New patches prevent data leaks and unauthorized access. Keep your Apple devices secure. #KernelSecurity #DataProtection 🛠️
Diving into reverse engineering & kernel security! Installed tools for: - Base System/Dev Essentials - Kernel Dev & Building - Debugging/Tracing - Virtualization (QEMU/KVM) - Fuzzing/Exploit Tools Mastering C, Asm & more. Tips are welcomed #ReverseEngineering #KernelSecurity


Memory mapping and kernel address space manipulation are still viable attack vectors. Defense must evolve. Full blog: versprite.com/blog/the-shell… #MemoryForensics #KernelSecurity #CyberDefens
Protects against stealthy persistence and privilege escalation Requires advanced telemetry (e.g., from EDRs or kernel sensors) SOC teams rely on this for deep visibility into stealthy threats that operate below the radar. #KernelSecurity #RootkitDetection #AdvancedThreats
🔍 Ned Williamson – Google Project Zero’s SockFuzzer creator—kernel fuzzer that found XNU concurrency bugs. Kernel-level fuzzer wizardry. #Fuzzing #KernelSecurity
Critical vulnerabilities found in Windows Kernel Streaming (KS) beyond MSKSSRV driver, allowing exploits like Windows 11 at Pwn2Own Vancouver 2024. Attackers exploited logical flaws & bypassed validation checks. 🖥️ #MicrosoftWindows #KernelSecurity ift.tt/Ior0L7A
Can we redesign the Linux kernel for better isolation without sacrificing performance? Meet LXD: Lightweight Execution Domains a step towards modular, fault-tolerant, and secure kernel architecture that just works Let’s break down this paper #OperatingSystems #KernelSecurity
🚨 New Blog Post: Exploiting CVE-2024-0582 via the Dirty Page Table Method! Discover how dangling pages can corrupt Page Table Entries (PTEs) and redirect user-space memory to kernel-space. Read the full analysis: kuzey.rs/posts/Dirty_Pa… #ExploitDevelopment #KernelSecurity
People think security is about defense. I believe it's about understanding. And understanding is the purest form of love. 🛡️ "Loving is understanding, Security is the subset of loving." — Seeker (李标明) #Infosec #KernelSecurity #Quote #哲学安全 #澄明之路
🔧Mitigating BYOVD Attacks: Protect Your Kernel! 🔧 🚀 Master advanced exploit defenses—enroll in our MED course 👉darkrelay.com/courses/master… #CyberSecurity #BYOVD #KernelSecurity #ExploitDevelopment #MED #ThreatIntelligence #CyberDefense #InfoSec #StaySecure




5/8 After SysBumps and TagBleed, SLAP & FLOP show how side-channel attacks are evolving. Combining multiple channels can further compromise kernel security. 🔒 #KernelSecurity
#KASLR #KernelSecurity #macOS SysBumps: A Groundbreaking KASLR Break Attack Targeting Apple Silicon macOS Devices cysecurity.news/2025/01/sysbum…

Kernel Exploitation 🚨 Modern attackers exploit vulnerabilities in OS kernels for privilege escalation. Techniques include exploiting race conditions, heap overflows, and bypassing KASLR. Defense? Patch aggressively and use kernel integrity tools. #Cybersecurity #KernelSecurity
2/13 Beware of kernel vulnerabilities! New patches prevent data leaks and unauthorized access. Keep your Apple devices secure. #KernelSecurity #DataProtection 🛠️
Good and interesting presentation by Joe Bialek: Pointer Problems – Why We’re Refactoring the Windows Kernel: youtube.com/watch?v=-3jxVI… #microsoft #windows #kernelsecurity #programming

🔒 New on arXiv! Discover "SafeBPF: Hardware-assisted Defense-in-depth for eBPF Kernel Extensions" - a groundbreaking approach to enhancing eBPF framework safety. Learn how SafeBPF isolates programs to prevent vulnerabilities: bit.ly/3XlaFbn #eBPF #kernelsecurity
🛠️ Harden your Linux kernel by applying sysctl settings such as disabling ICMP redirects and source routing: net.ipv4.conf.all.accept_redirects = 0 #Ethereum #KernelSecurity
In response to the recent CrowdStrike incident, Microsoft is focusing on reducing kernel-level access for software applications to enhance Windows security and resilience. 🔒🖥️ #Microsoft #CrowdStrike #KernelSecurity csoonline.com/article/347836…
csoonline.com
Microsoft shifts focus to kernel-level security after CrowdStrike incident
The company has hinted at a possible reduction of kernel-level access for software applications.
3/7 Kernel mode: essential for deep security integration, yet a significant point of failure. The CrowdStrike incident highlights this trade-off. #KernelSecurity
Diving into reverse engineering & kernel security! Installed tools for: - Base System/Dev Essentials - Kernel Dev & Building - Debugging/Tracing - Virtualization (QEMU/KVM) - Fuzzing/Exploit Tools Mastering C, Asm & more. Tips are welcomed #ReverseEngineering #KernelSecurity


Good and interesting presentation by Joe Bialek: Pointer Problems – Why We’re Refactoring the Windows Kernel: youtube.com/watch?v=-3jxVI… #microsoft #windows #kernelsecurity #programming

@silviocesare at @BSidesPer talking on bugs on open source code. #bughuntin #kernelsecurity #intergeroverflow

#Kernelsecurity is a key determinant of overall system #security - If the kernel is not properly secured, nothing on your system is! Learn how to secure the #Linuxkernel & protect your system from #malware & other exploits: linuxsecurity.com/features/featu… #Linux @linuxfoundation @sjvn

#KASLR #KernelSecurity #macOS SysBumps: A Groundbreaking KASLR Break Attack Targeting Apple Silicon macOS Devices cysecurity.news/2025/01/sysbum…

KernelCare now supported in our VPS and Dedicated Servers offer #kernelsecurity #kernelupdate #kernelcare #vps flexihost.io/blog/kernelcar…

🔧Mitigating BYOVD Attacks: Protect Your Kernel! 🔧 🚀 Master advanced exploit defenses—enroll in our MED course 👉darkrelay.com/courses/master… #CyberSecurity #BYOVD #KernelSecurity #ExploitDevelopment #MED #ThreatIntelligence #CyberDefense #InfoSec #StaySecure




Something went wrong.
Something went wrong.
United States Trends
- 1. Yamamoto 47.9K posts
- 2. #DWTS 44.1K posts
- 3. halsey 8,798 posts
- 4. Growth Path 1,623 posts
- 5. #FlyTogether 2,873 posts
- 6. Young Republicans 75.8K posts
- 7. #TexasHockey 3,412 posts
- 8. Kreider 1,303 posts
- 9. Ohtani 14.1K posts
- 10. Jared Butler N/A
- 11. #MakeOffer 11.2K posts
- 12. Domain For Sale 11.6K posts
- 13. #WWENXT 20.2K posts
- 14. Brewers 41.3K posts
- 15. TOKYO NARITA N/A
- 16. Jarry N/A
- 17. Will Richard 2,648 posts
- 18. Roldan 2,689 posts
- 19. Lucia 62.9K posts
- 20. Tami 4,537 posts