Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

googleprojectzero.blogspot.com

Project Zero

Get the latest updates from Project Zero directly as they happen.

Follow now 531 followers

Latest posts

Last updated about 19 hours ago

On the Effectiveness of Mutational Grammar Fuzzing

1 day ago

Mutational grammar fuzzing is a fuzzing technique in which the fuzzer uses...

Bypassing Administrator Protection by Abusing UI Access

22 days ago

Bypassing Administrator Protection by Abusing UI Access In my last blog post...

Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529

about 1 month ago

In the first part of this series, I detailed my journey into...

Bypassing Windows Administrator Protection

about 1 month ago

A headline feature introduced in the latest release of Windows 11, 25H2...

A 0-click exploit chain for the Pixel 9 Part 3: Where do we go from here?

about 2 months ago

While our previous two blog posts provided technical recommendations for increasing the...

A 0-click exploit chain for the Pixel 9 Part 2: Cracking the Sandbox with a Big Wave

about 2 months ago

With the advent of a potential Dolby Unified Decoder RCE exploit, it...

A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby

about 2 months ago

Over the past few years, several AI-powered features have been added to...

Welcome to the new Project Zero Blog

3 months ago

While on Project Zero, we aim for our research to be leading-edge...

Thinking Outside The Box [dusted off draft from 2017]

3 months ago

Preface Hello from the future! This is a blogpost I originally drafted...

Windows Exploitation Techniques: Winning Race Conditions with Path Lookups

3 months ago

This post was originally written in 2016 for the Project Zero blog...

A look at an Android ITW DNG exploit

3 months ago

 Posted by Benoît Sevens, Google Threat Intelligence GroupIntroductionBetween July 2024 and February...

A look at an Android ITW DNG exploit

3 months ago

Introduction Between July 2024 and February 2025, 6 suspicious image files were...