Remove tags Bug Bounty
article thumbnail

The Ups and Downs of 0-days: A Year in Review of 0-days Exploited In-the-Wild in 2022

Google Security

Maddie Stone, Security Researcher, Threat Analysis Group (TAG) This is Google’s fourth annual year-in-review of 0-days exploited in-the-wild [ 2021 , 2020 , 2019 ] and builds off of the mid-year 2022 review. Bug collisions are high. Project Zero wrote about one of these cases in November 2022 in their “Mind the Gap” blog post.

Spyware 92
article thumbnail

Machine Learning in Cybersecurity Course – Part 2: Specific Applications and Challenges

NopSec

In our l ast week’s blog post , we outlined the first part of that webinar, without going into the three specific applications and the challenges. For example, we could tag all messages that contain the expression ‘make money’ as spam. This would likely catch some spam messages, but it would not get us very far.

article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

Each night, he would go back, tweak it by adding more tools or bug fixes. He started to get requests from people, asking for tools to included as well as bug reports. As a result, there were multiple revisions made to address bug fixes and even a minor update. For more information, please see their blog post, PDF , and FAQs.

InfoSec 52