This talk will go through the process of an investigation of a recently published Apple sandbox escape zero-day. The process of uncovering a novel vulnerability is not an easy one; it is tedious and error-prone, requiring various methods and procedures. The talk will go through the various steps, from initiation to full discovery and analysis.
Hackers & Threats
data security hackers & threats threat management email security cyberattacks
Share With Your Community