A big shout-out to the #Synacktiv team for their strong performance at the latest #Pwn2Own competition in Cork!
They proudly secured third place overall π
Next stop: Tokyo for the upcoming edition π―π΅ π
More details on the targets and participants here βΉοΈ
www.zerodayinitiative.com/blog/2025/20...
31.10.2025 15:54 β π 3 π 3 π¬ 0 π 0
Paint it blue: Attacking the bluetooth stack
Paint it blue: Attacking the bluetooth stack
Following their presentation at @hexacon.bsky.social, @mtalbi.bsky.social & Etienne detail how they exploited CVE-2023-40129, a critical vulnerability affecting the Bluetooth stack in Android β¬οΈ
www.synacktiv.com/en/publicati...
27.10.2025 16:02 β π 6 π 5 π¬ 0 π 0
Impressive exploitation strategy!!
bsky.app/profile/thez...
23.10.2025 15:44 β π 3 π 0 π¬ 0 π 0
Confirmed! David Berard of @synacktiv.com used a pair of bugs to exploit the Ubiquiti AI Pro in the Surveillance Systems category. The impressive display (incl. a round of Baby Shark) earns him $30,000 and 3 Master of Pwn Points. #Pwn2Own
23.10.2025 13:31 β π 1 π 1 π¬ 0 π 1
π₯ Eyes wide shut! David Berard of @synacktiv.com just breached the @Ubiquiti AI Pro surveillance system at #Pwn2Own. He also serenaded us with round of "Baby Shark" played through the speaker. He's off to the disclosure room with an ear worm and the details.
23.10.2025 11:10 β π 3 π 4 π¬ 0 π 0
Confirmed! The team from @synacktiv.com used a buffer overflow to exploit the Phillips Hue Bridge. Their unique bug earns them $20,000 and 4 Master of Pwn points. #Pwn2Own
22.10.2025 17:11 β π 7 π 4 π¬ 0 π 0
Congrats to tek and anyfun for landing the first successful entry at #Pwn2OwnCork - exploiting a stack overflow on Synology BeeStation Plus for $40,000 and 4 Master of Pwn points in the process π₯
Letβs keep pushing πͺ
#P2OIreland #Synacktiv
21.10.2025 15:32 β π 4 π 4 π¬ 0 π 0
Impressive work from our team today at #Pwn2Own!
@mtalbi.bsky.social and Matthieu just pulled off an exploit on the Philips Hue Bridge without laying a finger on the device!
Great demonstration of Synacktivβs offensive expertise π
Come on π₯
22.10.2025 15:36 β π 13 π 7 π¬ 0 π 0
Exploit inside #pwn2own
22.10.2025 14:36 β π 3 π 0 π¬ 0 π 0
π’"Paint it Blue: Attacking the Bluetooth stack" by Mehdi Talbi and Etienne Helluy-Lafont
03.10.2025 15:58 β π 2 π 2 π¬ 0 π 0
Aaaand the first talk to be announced is... π₯
Exploiting the Undefined: PWNing Firefox by Settling its Promises by Tao Yan & Edouard Bochin
12.09.2025 09:18 β π 5 π 2 π¬ 0 π 0
It's already #SSTIC2025 day 2! @remi-j.bsky.social and us3r present the Windows kernel shadow stack mitigation πͺ
05.06.2025 09:08 β π 9 π 5 π¬ 0 π 0
π’ Our Call For Papers is open until 14 July!
β‘οΈ Details & benefits: www.hexacon.fr/conference/c...
Also, conference tickets will be on sale today at 4PM (UTC+2)
02.06.2025 10:04 β π 2 π 4 π¬ 0 π 0
iOS 18.4 - dlsym considered harmful
Observations We first observed the bug in a custom iOS application compiled for the arm64e architecture (thus supporting PAC instructions).
In iOS 18.4, Apple introduced a bug in dynamic symbol resolutions for some specific exports. @0xf4b.bsky.social took a long journey down a rabbit hole to understand its root cause.
www.synacktiv.com/en/publicati...
10.04.2025 13:22 β π 15 π 9 π¬ 0 π 0
.:: Phrack Magazine ::.
Phrack staff website.
Hackers rejoice!
We are releasing the Phrack 71 PDF for you today!
Don't forget this year is Phrack's 40th anniversary release! Send in your contribution and be part of this historical issue!
The CFP is still open, you can find it and the PDF link at phrack.org
15.02.2025 15:02 β π 63 π 33 π¬ 2 π 1
screenshot of the CFP on phrack.org
We updated our CFP for Phrack 72! The deadline is now April 1st 2025. Check the site for specifics on how to contribute, as well as some inspiration! We also posted a link to purchase physical copies of Phrack 71, and a donation link too. Enjoy!
phrack.org
16.12.2024 22:56 β π 118 π 60 π¬ 4 π 4
aka itszn (itszen)
0xffff000041414141
Security researcher creating pwnable puzzles
https://infosec.exchange/@nyanbox
https://x.com/itszn13
LLM Art: https://bsky.app/profile/alternet.site
LinuxFr.org (alias DLFP) : le seul compte Bsky officiel du site web francophone sur les logiciels libres/opensource et sujets affΓ©rents
Securing every bit of your data
https://quarkslab.com
Cyber / disinformation / privacy / Big Tech / scams @ Le Monde
Contact: familyname @lemonde.fr
Auteur d'"Espionner, mentir, dΓ©truire : comment le cyberespace est devenu un champ de bataille", Γ©ditions Grasset : cyber.untersin.gr
Weβre here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between.
www.interruptlabs.co.uk
Former biologist. Actual PhD in genetics. Security at Nvidia, OS security teaching at https://www.ischool.berkeley.edu.
Blog: https://mjg59.dreamwidth.org
Signal: @mjg.59
He/him
| CyberSecurity | Reverse Engineering | C and Rust | Exploit | Linux kernel | PhD | Only My Opinions :) |
β Cybersecurity reporter
β
Newsletters at Risky Business
#infosec #cybersecurity
https://risky.biz
Trend Zero Day Initiativeβ’ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
Not a 0x41 and done kinda gal
Offensive security conference in the heart of Paris. 10-11th October 2025
https://www.hexacon.fr/
Security engineer interested in reverse engineering, vulnerability exploitation & software development. Techno music enthusiast.
ActualitΓ©s et guides autour des jeux vidΓ©o. https://www.margxt.fr/
Autres réseaux et dernières infographies : https://bento.me/margxt
Researcher at CNRS. Feminist. I work on microarchitectural security.
https://cmaurice.fr
Professor in Computer Security @EURECOM
Ex Defcon CTF organizer with @oooverflow
I like computering. Doing security research at @rapid7 labs.
This is a professional account. Used to play a lot of CTF with @EatSleepPwnRpt and @StratumAuhuur
Three Buddy Problem
https://securityconversations.com
Security engineer at http://xairy.io. Focusing on the Linux kernel. Maintaining @linkersec.bsky.social. Trainings at http://xairy.io/trainings.