This article analyzes the CVE-2017-11826 exploit used in RTF documents to target Microsoft Office. Key techniques such as type confusion and ROP are discussed,
Google has launched a new project to clear vulnerabilities from the Google Play store by rewarding security experts who discover flaws in Android apps with at l
This article analyzes the Windows DNS API RCE vulnerability discovered in Microsoft's 2017 security bulletin, focusing on the Nsec3_RecordRead function within d
Explore the WPA2 Key Reinstallation Attack (KRACK) in this comprehensive analysis report. Learn about its impact on Linux and Android devices and how to protect