Rohit Mothe
@rohitwas
Security Re..(dare i say it?) , struggling janitor. tweets,replies,retweets,likes,DMs entirely my own doing, undoing
ID: 81562812
11-10-2009 10:04:33
666 Tweet
795 Takipçi
157 Takip Edilen
MSRC Vulnerability and Mitigation (V&M) team is expanding into exciting challenges of Open-Source vulnerability response and research. This is an opportunity for you to redefine how Microsoft respond and research in this space. Interested? Apply @ jobs.careers.microsoft.com/us/en/job/1611…
MSRC V&M is expanding and is looking for a leader who can guide team of hackers in tackling challenging problems in the areas of Open Source, Supply Chain and Hardware security. If you have the skills and passion for vulnerability management. Apply Now @ jobs.careers.microsoft.com/global/en/job/…
This week's Patch Tuesday included 8 CVEs that Rohit Mothe and I found! We've been focusing on findings ways to bypass MapUrlToZone and found several very interesting ways to confuse it. This is an API we've seen a lot of interest in lately, so good to have it locked down!
At DEF CON 33, George Hughey (George Hughey) and Rohit Mothe (Rohit Mothe), Senior Security Research Managers at MSRC, took us back to the 90s with their talk on the ghost of Internet Explorer in Windows: MapUrlToZone. They uncovered how this legacy API, used by Outlook, Office,