Denis Skvortcov

94 posts

Denis Skvortcov banner
Denis Skvortcov

Denis Skvortcov

@Denis_Skvortcov

Independent information security researcher • Lead application security researcher at AppSec @Kaspersky • OSCP OSWE

انضم Ağustos 2020
101 يتبع639 المتابعون
تغريدة مثبتة
Denis Skvortcov
Denis Skvortcov@Denis_Skvortcov·
I’ve written my first blog post - write-up for CVE-2021-23874! How to enumerate COM-objects attack surface, explore implemented functionality and exploit it the-deniss.github.io/posts/2021/05/…
English
8
155
346
0
Denis Skvortcov أُعيد تغريده
starlabs
starlabs@starlabs_sg·
CimFS: Crashing in memory, Finding SYSTEM! @cplearns2h4ck dug into Microsoft CimFS, found a sneaky 0-day, and guess what? The fix by Microsoft was just locking the door 🔐on unprivileged users. 😂 Dive into the adventure with us: starlabs.sg/blog/2025/03-c…
English
1
60
161
39K
Denis Skvortcov أُعيد تغريده
Robel Campbell
Robel Campbell@RobelCampbell·
Excellent write-up on CVE-2024-38063 by Marcus Hutchins. malwaretech.com/2024/08/exploi… This was my first time ever reversing tcpip.sys and despite making many mistakes along the way I have learned a ton.
English
0
49
142
10K
Denis Skvortcov
Denis Skvortcov@Denis_Skvortcov·
Our team has uncovered multiple memory corruption vulnerabilities in FreeRDP and Suricata. These flaws could potentially expose users to significant security risks. Read the full report in blog post to understand the issues and how to protect your systems securelist.com/suricata-freer…
English
0
4
5
603
Denis Skvortcov أُعيد تغريده
Phrack Zine
Phrack Zine@phrack·
The time has come, and with it your reading material for the week. Phrack #71 is officially released ONLINE! Let us know what you think! phrack.org/issues/71/1.ht…
Phrack Zine tweet media
English
15
494
1K
161.5K
Denis Skvortcov أُعيد تغريده
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
🤯 The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)! I hope it helps to make sense of the information out there. Please treat the information "as is" while the analysis progresses! 🧐 #infosec #xz
Thomas Roccia 🤘 tweet media
English
101
3.1K
12.4K
1.1M
Denis Skvortcov أُعيد تغريده
Man Yue Mo
Man Yue Mo@mmolgtm·
In this post I'll use CVE-2023-6241, a vulnerability in the Arm Mali GPU that I reported last November to gain arbitrary kernel code execution from an untrusted app on a Pixel 8 with MTE enabled. github.blog/2024-03-18-gai…
English
8
147
411
97K
Denis Skvortcov أُعيد تغريده
Maddie Stone
Maddie Stone@maddiestone·
Who needs a 0-click when you have MITM? ✨ Working with @billmarczak & @citizenlab we discovered 3 iOS and 1 Chrome 0-day from Intellexa, used to install Predator spyware in Egypt 🇪🇬 blog.google/threat-analysi…
English
6
278
933
327.1K
Denis Skvortcov أُعيد تغريده
Aleksei Kulaev
Aleksei Kulaev@flat_z·
finally... hello, PS5 PSP :)
Aleksei Kulaev tweet media
English
130
244
1.5K
352K
Denis Skvortcov أُعيد تغريده
Tavis Ormandy
Tavis Ormandy@taviso·
First big result from our new CPU research project, a use-after-free in AMD Zen2 processors! 🔥 AMD have just released updated microcode for affected systems, please update! lock.cmpxchg8b.com/zenbleed.html
GIF
English
34
655
1.8K
337.1K
Denis Skvortcov
Denis Skvortcov@Denis_Skvortcov·
I’ve found new vulnerability CVE-2023-1586 in Avast Anti-Virus restore malware functionality that could allow an attacker to gain SYSTEM privileges and execute arbitrary code! Details in my new short post the-deniss.github.io/posts/avast-pr…
English
1
60
135
28.6K
Denis Skvortcov
Denis Skvortcov@Denis_Skvortcov·
Did you know that just a few month ago, if Avast quarantined your malware, it wasn't a problem, it was the opportunity.. to gain SYSTEM privileges and execute arbitrary code! Details of exploit chain CVE-2023-1585 and CVE-2023-1587 in my new post the-deniss.github.io/posts/2023/04/…
English
0
124
346
41.3K
Denis Skvortcov أُعيد تغريده
David Weston (DWIZZZLE)
David Weston (DWIZZZLE)@dwizzzleMSFT·
My presentation slides for "Windows 11: security by-default" from @BlueHatIL covering: Rust in win32k, Adminless Windows, Token Binding, Sandboxing win32, and more! posted here: github.com/dwizzzle/Prese…
David Weston (DWIZZZLE) tweet mediaDavid Weston (DWIZZZLE) tweet media
English
9
91
300
106.7K
Denis Skvortcov أُعيد تغريده
Saar Amar
Saar Amar@AmarSaar·
Time for a new blogpost! Let's do a CHERIoT walkthrough - including a straightforward setup, understanding how we kill bug classes and mitigating attacks on our minimal TCB through practical examples, and more fun! msrc.microsoft.com/blog/2023/02/f…
Saar Amar tweet media
English
1
55
149
78.8K