Posted on
in Presentations
This talk will go through the process of an investigation of a recently published Apple sandbox escape zero-day. The process of uncovering a novel vulnerability is not an easy one; it is tedious and error-prone, requiring various methods and procedures. The talk will go through the various steps, from initiation to full discovery and analysis.
Hackers & Threats
data security hackers & threats threat management email security cyberattacks
Topic
Hackers & Threats
Subtopic
data security
hackers & threats
threat management
email security
cyberattacks
Share With Your Community