#kernelsecurity 検索結果
Diving into reverse engineering & kernel security! Installed tools for: - Base System/Dev Essentials - Kernel Dev & Building - Debugging/Tracing - Virtualization (QEMU/KVM) - Fuzzing/Exploit Tools Mastering C, Asm & more. Tips are welcomed #ReverseEngineering #KernelSecurity
 
                                             
                                            Good and interesting presentation by Joe Bialek: Pointer Problems – Why We’re Refactoring the Windows Kernel: youtube.com/watch?v=-3jxVI… #microsoft #windows #kernelsecurity #programming
 
                                            @silviocesare at @BSidesPer talking on bugs on open source code. #bughuntin #kernelsecurity #intergeroverflow
 
                                            🚨 New Blog Post: Exploiting CVE-2024-0582 via the Dirty Page Table Method! Discover how dangling pages can corrupt Page Table Entries (PTEs) and redirect user-space memory to kernel-space. Read the full analysis: kuzey.rs/posts/Dirty_Pa… #ExploitDevelopment #KernelSecurity
#KASLR #KernelSecurity #macOS SysBumps: A Groundbreaking KASLR Break Attack Targeting Apple Silicon macOS Devices cysecurity.news/2025/01/sysbum…
 
                                            #Kernelsecurity is a key determinant of overall system #security - If the kernel is not properly secured, nothing on your system is! Learn how to secure the #Linuxkernel & protect your system from #malware & other exploits: linuxsecurity.com/features/featu… #Linux @linuxfoundation @sjvn
 
                                            #KernelSecurity - exploiting a kernel NULL dereference (2) http://j.mp/beBaXW
#KernelSecurity #NULL Pointer Dereference in C Programming Language (1) http://j.mp/caFMjZ
🔧Mitigating BYOVD Attacks: Protect Your Kernel! 🔧 🚀 Master advanced exploit defenses—enroll in our MED course 👉darkrelay.com/courses/master… #CyberSecurity #BYOVD #KernelSecurity #ExploitDevelopment #MED #ThreatIntelligence #CyberDefense #InfoSec #StaySecure
 
                                             
                                             
                                             
                                            KernelCare now supported in our VPS and Dedicated Servers offer #kernelsecurity #kernelupdate #kernelcare #vps flexihost.io/blog/kernelcar…
 
                                            Critical vulnerabilities found in Windows Kernel Streaming (KS) beyond MSKSSRV driver, allowing exploits like Windows 11 at Pwn2Own Vancouver 2024. Attackers exploited logical flaws & bypassed validation checks. 🖥️ #MicrosoftWindows #KernelSecurity ift.tt/Ior0L7A
hendryadrian.com
Streaming vulnerabilities from Windows Kernel - Proxying to Kernel - Part I
Researchers uncovered a series of critical vulnerabilities in the Windows Kernel Streaming (KS) components, focusing on a previously overlooked attack surface beyond the well-known MSKSSRV driver....
Memory mapping and kernel address space manipulation are still viable attack vectors. Defense must evolve. Full blog: versprite.com/blog/the-shell… #MemoryForensics #KernelSecurity #CyberDefens
🛠️ Harden your Linux kernel by applying sysctl settings such as disabling ICMP redirects and source routing: net.ipv4.conf.all.accept_redirects = 0 #Ethereum #KernelSecurity
🔒 New on arXiv! Discover "SafeBPF: Hardware-assisted Defense-in-depth for eBPF Kernel Extensions" - a groundbreaking approach to enhancing eBPF framework safety. Learn how SafeBPF isolates programs to prevent vulnerabilities: bit.ly/3XlaFbn #eBPF #kernelsecurity
Modern kernel privilege escalation attacks have shifted to stealthy data-only methods bypassing Control Flow Integrity. VED defense system counters threats with integrity measures like shadow data tracking and slab poisoning to strengthen kernel #KernelSecurity #DataExploits
Protects against stealthy persistence and privilege escalation Requires advanced telemetry (e.g., from EDRs or kernel sensors) SOC teams rely on this for deep visibility into stealthy threats that operate below the radar. #KernelSecurity #RootkitDetection #AdvancedThreats
🖥️ Kernel and Bootkits: Kernel-Level Rootkits: They manipulate OS kernels to stay hidden and avoid detection. Bootkits: Infect the boot process to control the system before the OS loads, even bypassing encryption. #KernelSecurity #Bootkits
Keep an eye on this one: #linux #linuxsecurity #kernelsecurity securityonline.info/critical-remot…
This vulnerability involves the `ltq-ptm` driver, which exposes kernel memory to local read/write attacks through ioctls. #KernelSecurity
Diving into reverse engineering & kernel security! Installed tools for: - Base System/Dev Essentials - Kernel Dev & Building - Debugging/Tracing - Virtualization (QEMU/KVM) - Fuzzing/Exploit Tools Mastering C, Asm & more. Tips are welcomed #ReverseEngineering #KernelSecurity
 
                                             
                                            Memory mapping and kernel address space manipulation are still viable attack vectors. Defense must evolve. Full blog: versprite.com/blog/the-shell… #MemoryForensics #KernelSecurity #CyberDefens
Protects against stealthy persistence and privilege escalation Requires advanced telemetry (e.g., from EDRs or kernel sensors) SOC teams rely on this for deep visibility into stealthy threats that operate below the radar. #KernelSecurity #RootkitDetection #AdvancedThreats
🔍 Ned Williamson – Google Project Zero’s SockFuzzer creator—kernel fuzzer that found XNU concurrency bugs. Kernel-level fuzzer wizardry. #Fuzzing #KernelSecurity
Critical vulnerabilities found in Windows Kernel Streaming (KS) beyond MSKSSRV driver, allowing exploits like Windows 11 at Pwn2Own Vancouver 2024. Attackers exploited logical flaws & bypassed validation checks. 🖥️ #MicrosoftWindows #KernelSecurity ift.tt/Ior0L7A
hendryadrian.com
Streaming vulnerabilities from Windows Kernel - Proxying to Kernel - Part I
Researchers uncovered a series of critical vulnerabilities in the Windows Kernel Streaming (KS) components, focusing on a previously overlooked attack surface beyond the well-known MSKSSRV driver....
Recent discoveries show that even well-maintained distros like Ubuntu have had kernel namespace restriction bypasses allowing local privilege escalations. #Ubuntu #KernelSecurity
Can we redesign the Linux kernel for better isolation without sacrificing performance? Meet LXD: Lightweight Execution Domains a step towards modular, fault-tolerant, and secure kernel architecture that just works Let’s break down this paper #OperatingSystems #KernelSecurity
🚨 New Blog Post: Exploiting CVE-2024-0582 via the Dirty Page Table Method! Discover how dangling pages can corrupt Page Table Entries (PTEs) and redirect user-space memory to kernel-space. Read the full analysis: kuzey.rs/posts/Dirty_Pa… #ExploitDevelopment #KernelSecurity
People think security is about defense. I believe it's about understanding. And understanding is the purest form of love. 🛡️ "Loving is understanding, Security is the subset of loving." — Seeker (李标明) #Infosec #KernelSecurity #Quote #哲学安全 #澄明之路
🔧Mitigating BYOVD Attacks: Protect Your Kernel! 🔧 🚀 Master advanced exploit defenses—enroll in our MED course 👉darkrelay.com/courses/master… #CyberSecurity #BYOVD #KernelSecurity #ExploitDevelopment #MED #ThreatIntelligence #CyberDefense #InfoSec #StaySecure
 
                                             
                                             
                                             
                                            5/8 After SysBumps and TagBleed, SLAP & FLOP show how side-channel attacks are evolving. Combining multiple channels can further compromise kernel security. 🔒 #KernelSecurity
#KASLR #KernelSecurity #macOS SysBumps: A Groundbreaking KASLR Break Attack Targeting Apple Silicon macOS Devices cysecurity.news/2025/01/sysbum…
 
                                            Kernel Exploitation 🚨 Modern attackers exploit vulnerabilities in OS kernels for privilege escalation. Techniques include exploiting race conditions, heap overflows, and bypassing KASLR. Defense? Patch aggressively and use kernel integrity tools. #Cybersecurity #KernelSecurity
2/13 Beware of kernel vulnerabilities! New patches prevent data leaks and unauthorized access. Keep your Apple devices secure. #KernelSecurity #DataProtection 🛠️
Good and interesting presentation by Joe Bialek: Pointer Problems – Why We’re Refactoring the Windows Kernel: youtube.com/watch?v=-3jxVI… #microsoft #windows #kernelsecurity #programming
 
                                            🔒 New on arXiv! Discover "SafeBPF: Hardware-assisted Defense-in-depth for eBPF Kernel Extensions" - a groundbreaking approach to enhancing eBPF framework safety. Learn how SafeBPF isolates programs to prevent vulnerabilities: bit.ly/3XlaFbn #eBPF #kernelsecurity
🛠️ Harden your Linux kernel by applying sysctl settings such as disabling ICMP redirects and source routing: net.ipv4.conf.all.accept_redirects = 0 #Ethereum #KernelSecurity
In response to the recent CrowdStrike incident, Microsoft is focusing on reducing kernel-level access for software applications to enhance Windows security and resilience. 🔒🖥️ #Microsoft #CrowdStrike #KernelSecurity csoonline.com/article/347836…
csoonline.com
Microsoft shifts focus to kernel-level security after CrowdStrike incident
The company has hinted at a possible reduction of kernel-level access for software applications.
Diving into reverse engineering & kernel security! Installed tools for: - Base System/Dev Essentials - Kernel Dev & Building - Debugging/Tracing - Virtualization (QEMU/KVM) - Fuzzing/Exploit Tools Mastering C, Asm & more. Tips are welcomed #ReverseEngineering #KernelSecurity
 
                                             
                                            Good and interesting presentation by Joe Bialek: Pointer Problems – Why We’re Refactoring the Windows Kernel: youtube.com/watch?v=-3jxVI… #microsoft #windows #kernelsecurity #programming
 
                                            @silviocesare at @BSidesPer talking on bugs on open source code. #bughuntin #kernelsecurity #intergeroverflow
 
                                            #Kernelsecurity is a key determinant of overall system #security - If the kernel is not properly secured, nothing on your system is! Learn how to secure the #Linuxkernel & protect your system from #malware & other exploits: linuxsecurity.com/features/featu… #Linux @linuxfoundation @sjvn
 
                                            KernelCare now supported in our VPS and Dedicated Servers offer #kernelsecurity #kernelupdate #kernelcare #vps flexihost.io/blog/kernelcar…
 
                                            #KASLR #KernelSecurity #macOS SysBumps: A Groundbreaking KASLR Break Attack Targeting Apple Silicon macOS Devices cysecurity.news/2025/01/sysbum…
 
                                            🔧Mitigating BYOVD Attacks: Protect Your Kernel! 🔧 🚀 Master advanced exploit defenses—enroll in our MED course 👉darkrelay.com/courses/master… #CyberSecurity #BYOVD #KernelSecurity #ExploitDevelopment #MED #ThreatIntelligence #CyberDefense #InfoSec #StaySecure
 
                                             
                                             
                                             
                                            Something went wrong.
Something went wrong.
United States Trends
- 1. Happy Halloween 337K posts
- 2. YouTube TV 58.4K posts
- 3. Good Friday 36.2K posts
- 4. #T1WIN 14.7K posts
- 5. #RUNSEOKJIN_epTOUR_ENCORE 208K posts
- 6. THE TRUTH UNTOLD 27.6K posts
- 7. #FridayVibes 2,967 posts
- 8. Reformation Day 1,330 posts
- 9. Hulu 19.1K posts
- 10. Mary Ann 1,206 posts
- 11. Faker 23.3K posts
- 12. #Jin_TOUR_ENCORE 188K posts
- 13. Trick or Treat 304K posts
- 14. YTTV N/A
- 15. #PondPhuwinFanconD1 1.03M posts
- 16. Fubo 1,447 posts
- 17. Sunday Ticket N/A
- 18. ESPN and ABC 1,850 posts
- 19. Nuclear Option 15.7K posts
- 20. Samhain 5,842 posts
 
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
            