Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Trend Micro
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
MindshaRE: Using Binary Ninja API to Detect Potential Use-After-Free Vulnerabilities
March 27, 2025 | Reno Robert
CONTINUE READING
SUBSCRIBE
Blog post
Pwn2Own Automotive 2025: The Full Schedule
January 21, 2025
Pwn2Own
,
Automotive
,
Schedule
Blog post
Looking at the Attack Surfaces of the Pioneer DMH-WT7600NEX IVI
January 20, 2025
Pioneer
,
IVI
,
Attack Surface
Blog post
Reviewing the Attack Surface of the Autel MaxiCharger: Part Two
January 16, 2025
Autel
,
Attack Surface
,
EV Charger
Blog post
Reviewing the Attack Surface of the Autel MaxiCharger: Part One
January 15, 2025
Automotive
,
Autel
,
EV Charger
,
Attack Surface
Blog post
The January 2025 Security Update Review
January 14, 2025
Security Patch
,
Adobe
,
Microsoft
Blog post
Looking at the Attack Surfaces of the Sony XAV-AX8500 Part 2
January 10, 2025
Automotive
,
Sony
,
Attack Surface
Blog post
Looking at the Attack Surfaces of the Sony XAV-AX8500
January 09, 2025
Sony
,
Automotive
,
Attack Surface
Blog post
ZDI Threat Hunting 2024: Highlights, Trends, & Challenges
January 08, 2025
Threat Hunting
,
Retrospective
Blog post
Detailing the Attack Surfaces of the Tesla Wall Connector EV Charger
December 17, 2024
Tesla
,
EV
,
Automotive
Blog post
SolarWinds Access Rights Manager: One Vulnerability to LPE Them All
December 12, 2024
SolarWinds
,
Research
,
LPE
keyboard_arrow_left
keyboard_arrow_right