Obscillum
@Obscillum
Followers
18
Following
9
Media
0
Statuses
36
Diving into cybersecurity research, uncovering vulnerabilities & exploits. Shedding light on digital shadows, one discovery at a time. 💻 #InfoSec #CyberSec
Aether
Joined April 2023
The "Randomized slab caches for kmalloc()" patch was merged into mainline. With CONFIG_RANDOM_KMALLOC_CACHES=y, each kmalloc cache is split into 16. kmalloc uses a random one for each allocation based on the code location. Choices change every reboot. https://t.co/EoSYZxc8gI
1
34
110
🤝 Follow us for more updates as we continue our analysis of CVE-2023-28227 and work towards uncovering the true nature of this bug. 🕵️💡 #VulnerabilityResearch #StayInformed
0
0
1
🔧 The BnepBookmarkIncomingPacket() function seems to be involved. An additional check is now performed before entering a while loop to ensure that r14_2 <= 0x68c (1,676). 📝🔐 #FunctionAnalysis
1
0
1
🔍 Preliminary findings suggest the vulnerability may be related to a patch in the bthpan.sys kernel driver, responsible for Bluetooth Personal Area Network. 🌐💻 #BthpanSys #KernelDriver
1
0
1
🚨 Early info on CVE-2023-28227: Windows Bluetooth RCE! 🧐 We're working hard to analyze the patch and pinpoint the bug. Stay tuned for updates! #CVE2023 #BluetoothRCE #WindowsSecurity
1
0
2
🔍 Boost product security with Variant Analysis! 🌐💡 Discover its benefits in our latest blog post. 🚀 Let's work together to stay ahead of cyber adversaries. ✨🤝 📚 Read more: https://t.co/nKz6yD8r3g 📞 Contact us for a FREE consultation. #VariantAnalysis #ObscillumResearch
obscillum.com
Outline Introduction What is Variant Analysis? The Impact of Variant Analysis on Product Security Shifting from Arcane Methods to Comprehensive Variant Analysis Benefits of Variant Analysis for...
0
0
2
🌐 Discover more about the importance of variant analysis in product security by checking out the full post on Obscillum's LinkedIn page! 📖🔗 #LinkedInPost #LearnMore ➡️
linkedin.com
Obscillum Research LLC | 21 followers on LinkedIn. Empowering Cybersecurity Research: Uncovering Hidden Insights to Safeguard Your Digital Future | Welcome to Obscillum, a cybersecurity research firm...
0
0
2
🎯 By doing so, organizations can identify and patch similar vulnerabilities within their products, enhancing their product security posture and staying ahead of adversaries. ⚔️🛡️ #StayAhead #RobustSecurity
1
0
1
✅ While this is great for researchers, businesses should also adopt a proactive approach by performing variant and root cause analysis internally before vulnerabilities are disclosed publicly. 🛡️🔍 #ProactiveSecurity
1
0
1
📚 From firsthand experience in responsible disclosure, We have seen researchers race to perform root cause and variant analysis on newly discovered vulnerabilities. Their goal? To find variants and submit them to bug bounty programs. 🏃♂️💰 #BugBounty #ResponsibleDisclosure
1
0
1
🚀 Have you considered the power of variant analysis in product security? It's time to dive into the benefits of this often-underestimated approach. 🧐💡 #ProductSecurity #VariantAnalysis
1
0
1
😃 If you found these insights into the thought process and logic behind vulnerability research helpful, give us a follow for more valuable content! 🌟 @Obscillum #VulnerabilityResearchTips
0
0
0
📈 Vulnerability research is a journey, and staying informed is key. Keep learning, and you'll become a more effective researcher, contributing to the security of large, complex systems. 🏆 #StayInformed #VulnerabilityResearchSuccess
1
0
0
📚 Keep learning and updating your knowledge of attack vectors, coding patterns, and best practices. This will help you better identify potential issues and improve your vulnerability hunting strategy. 🧠 #ContinuousLearning #SecurityExpertise
1
0
0
🔧 Another tip is to automate your process as much as possible. Use tools that help you track, identify, and record these functions. This way, you can keep an eye on potential security risks that might arise from human error in future updates. 🛠️ #Automation #SecurityTools
1
0
0
🕵️♂️ When auditing code, don't dismiss non-exploitable bugs. Keep detailed notes on them, and monitor the areas of code where they occur. This vigilance will help you spot when a developer forgets to properly check the return value or input args. 🔍 #CodeAudit #SecurityAwareness
1
0
0
📝 It's crucial to keep track of those functions where the caller is responsible for handling checks before and after the given function call. Why? Because developers are human, and mistakes can happen! 🙌 #DeveloperMistakes #InsecureCode
1
0
0
🚀 Getting started with vulnerability research on large, complex targets can be daunting. But what do you do with non-exploitable bugs found within simple routines that return a size value, where the caller is responsible for verification? 🧐 #BugHunting #VulnerabilityResearch
1
0
1
Stay informed and up-to-date with the latest product security strategies by following our Twitter @Obscillum & Linkedin https://t.co/jHM1Vv6G1w 🌟🌐 #ProductSecurity #StayUpdated
linkedin.com
Obscillum Research LLC | 21 followers on LinkedIn. Empowering Cybersecurity Research: Uncovering Hidden Insights to Safeguard Your Digital Future | Welcome to Obscillum, a cybersecurity research firm...
0
0
0