matteo malvica ⭕ (@matteomalvica) 's Twitter Profile
matteo malvica ⭕

@matteomalvica

researcher @offsectraining 🥁

ID: 50282273

linkhttp://uf0.org calendar_today24-06-2009 11:43:41

1,1K Tweet

2,2K Takipçi

192 Takip Edilen

matteo malvica ⭕ (@matteomalvica) 's Twitter Profile Photo

Has been such an honor to be part of this event – a dream conference come true! 🔥💥 Killer talks and super engaging attendees. Huge props to Outflank and MDSec for making it all possible. Already looking forward to the next one! 🎤

No Starch Press (@nostarch) 's Twitter Profile Photo

Want to hunt zero-days like a pro? While spaceraccoon | Eugene Lim shares his vulnerability research expertise at #OSSummit Tokyo, grab his guide to tracking down security flaws at 30% off! Code ZERODAYDISCOUNT until tomorrow at midnight PT. nostarch.com/zero-day

Ivan Fratric 💙💛 (@ifsecure) 's Twitter Profile Photo

Don't panic now, but LLM-based agent discovered a previously unknown real-world vulnerability. Details in googleprojectzero.blogspot.com/2024/10/from-n…

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Attackers can use QR codes to bypass browser isolation and establish command and control. Learn how the technique works, and recommendations on how to stay ahead of this threat: bit.ly/49uMYms

Attackers can use QR codes to bypass browser isolation and establish command and control. 

Learn how the technique works, and recommendations on how to stay ahead of this threat: bit.ly/49uMYms
Outflank (@outflanknl) 's Twitter Profile Photo

Virtual fortresses aren’t as invincible as they seem 🏰⚔️. Read about our latest research on using Secure Enclaves in Windows for offensive ops — plus fresh insights for red teamers. Check out Part 1 of our blog series here: outflank.nl/blog/2025/02/0…

j j (@mistymntncop) 's Twitter Profile Photo

"WebAssembly Is All You Need:Exploiting Chrome and the V8 Sandbox 10+ times with WASM" by Xion Worth a watch :) youtube.com/watch?v=nb1so4…

chompie (@chompie1337) 's Twitter Profile Photo

Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application. ibm.com/think/x-force/…