It exploits a parser for #JBIG2—an obsolete file format. In today’s #SBBlogwatch, we wonder what other nasties lurk in unmaintained, legacy #OpenSource code.
— @Richi 😷 Jennings (@RiCHi) December 17, 2021
At @SecurityBlvd: https://t.co/GojEm4oOSo
Friday, 17 December 2021
NSO Zero-Click Exploit: Turing-Complete CPU in Image File - Security Boulevard
SEAR+GP0 vs. NSO: Researchers have reverse engineered NSO Group’s recent zero-click iPhone exploit—from the Pegasus spyware suite. And it’s a doozy: People are using words like, “terrifying,” “alarming,” “dangerous,” “weird,” “amazing,” “impressive,” “brilliant” and “ridiculous.”
No comments:
Post a Comment