Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

zerodayinitiative.com

Zero Day Initiative - Blog

Get the latest updates from Zero Day Initiative - Blog directly as they happen.

Follow now 178 followers

Latest posts

Last updated about 4 hours ago

Exploiting Exchange PowerShell After ProxyNotShell: Part 3 – DLL Loading Chain for RCE

about 4 hours ago

As you may know, I recently presented my Exchange-related talk during OffensiveCon...

Exploiting Exchange PowerShell After ProxyNotShell: Part 2 - ApprovedApplicationCollection

7 days ago

As you may know, I recently presented my Exchange-related talk during OffensiveCon...

The September 2024 Security Update Review

9 days ago

We’ve reached September and the pumpkin spice floats in the air. While...

Exploiting Exchange PowerShell After ProxyNotShell: Part 1 - MultiValuedProperty

14 days ago

As you may know, I recently presented my Exchange-related talk during OffensiveCon...

Abusing Arbitrary File Deletes to Escalate Privilege and Other Great Tricks (Archive)

16 days ago

This version of the blog is preserved for archival purposes only. An...

CVE-2024-37079: VMware vCenter Server Integer Underflow Code Execution Vulnerability

22 days ago

In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report...

From Pwn2Own Automotive: Taking Over the Autel Maxicharger

28 days ago

This blog highlights two vulnerabilities that were disclosed by researchers from Synacktiv...

CVE-2024-38213: Copy2Pwn Exploit Evades Windows Web Protections

about 1 month ago

Zero Day Initiative threat researchers discovered CVE-2024-38213, a simple and effective way...

The August 2024 Security Update Review

about 1 month ago

I have successfully survived Summer Hacker Camp, and I hope you have...

Introducing the Vanguard Awards

about 2 months ago

This year at Black Hat USA, Trend Micro’s Zero Day Initiative (ZDI)...

Breaking Barriers and Assumptions: Techniques for Privilege Escalation on Windows: Part 3

about 2 months ago

To wrap up this blog series we wanted to include one more...

Breaking Barriers and Assumptions: Techniques for Privilege Escalation on Windows: Part 2

about 2 months ago

The number of vulnerabilities that we see through the program provides significant...