Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
The December 2025 Security Update Review
December 09, 2025 | Dustin Childs
CONTINUE READING
SUBSCRIBE
Blog post
The June 2020 Security Update Review
June 09, 2020
Microsoft
,
Adobe
,
Security Patch
Blog post
MindShaRE: How to “Just Emulate It With QEMU”
May 27, 2020
MindshaRE
,
Reverse Engineering
,
QEMU
Blog post
CVE-2020-8871: Privilege Escalation in Parallels Desktop via VGA Device
May 21, 2020
Parallels
,
Exploit
,
Research
Blog post
The May 2020 Security Update Review
May 12, 2020
Adobe
,
Microsoft
,
Security Patch
Blog post
Details on the Oracle WebLogic Vulnerability Being Exploited in the Wild
May 11, 2020
Oracle
,
WebLogic
,
Exploit
Blog post
How a Deceptive Assert Caused a Critical Windows Kernel Vulnerability
May 07, 2020
Windows
,
Microsoft
,
Research
Blog post
Analyzing a Trio of Remote Code Execution Bugs in Intel Wireless Adapters
May 05, 2020
Intel
,
Wireless
,
Research
Blog post
CVE-2020-0932: Remote Code Execution on Microsoft SharePoint Using TypeConverters
April 29, 2020
Microsoft
,
SharePoint
,
Exploit
Blog post
MindShaRE: Using lldbinit to Enhance the LLDB Debugger
April 21, 2020
MindshaRE
,
Debugger
,
LLDB
Blog post
CVE-2020-8835: Linux Kernel Privilege Escalation via Improper eBPF Program Verification
April 16, 2020
Linux
,
Pwn2Own
,
Exploit
,
LPE
keyboard_arrow_left
keyboard_arrow_right