Wojciech Reguła
@_r3ggi
Followers
6K
Following
5K
Media
343
Statuses
2K
iOS/macOS app security researcher & blogger. 🍎 Black Hat / DEF CON / TyphoonCon speaker. Head of mobile appsec @SecuRingPL
Katowice, Poland
Joined August 2015
If you are interested in expanding your knowledge about #iOS #application #security, be sure to check the iASE Course at: https://t.co/HVFMSp41su. Here's a quick video about the content of the course 👇
3
13
67
Short post about LPE and TCC Bypass on macOS through third-party apps bundled with Sparkle framework - a reminder of why XPC services should validate their clients. https://t.co/uymrg3U72K
afine.com
The article discusses vulnerabilities in the Sparkle framework on macOS, related to improper XPC client validation: CVE-2025-10015 and CVE-2025-10016.
3
34
94
“I've taken that same anointing upon Ronald, speaking of Ronald Reagan, and I've put it upon my Donald .” @TheElijahList @ElijahStreamsTV
0
3
29
At #OBTS, Wojciech (@_r3ggi) from @SecuRingPL cleverly exposed different flaws in macOS location services, side-channels, leaky apps, and how attackers can track you without zero-days — and gave tips on how defenders can fight back.
0
4
16
🍹 Day 2 — Evening wrap (six talks, brains buzzing) #OBTS 🍏 – 🧪 Beyond Static Labels — behavior-first grayware: deception • persistence • monetization • consent • payload; Adload (2016–2025) proves stickers lie, behavior tells. Rousana Charles – 🧭 Who Cares Where Waldo Is
0
3
13
1
4
10
I do feel cooked about my Mac OS location after @_r3ggi talk on Objective by the Sea in Ibiza Thanks for amazing presentation
0
3
13
This analysis was brought to you by the ipsw and ghidriff toolchain, plus some AI glue. I'll be dropping all the new research on automating Apple patch analysis at my talk "Reverse Engineering Apple Security Updates" at OBTS v8. Stop guessing, start knowing! #OBTSv8
0
5
20
For those missing the talk, Blog: https://t.co/XBvFMbsfi0 Slides:
github.com
Mickey's Blogs. Contribute to jhftss/jhftss.github.io development by creating an account on GitHub.
6
42
166
New Blog: CVE-2025-24103 : General TCC Bypass https://t.co/8pBcq889at
1
21
119
Apple fixed 4 my vulnerabilities in macOS 15.4 ( https://t.co/jHkJ9SOPhZ). I believe that the libnetcore and Quick Look issues will also have CVEs assigned as they are not informative severity issues (e.g. full iOS/macOS parental control bypass). 🍎🔐
3
3
57
special thanks to @_r3ggi for their previous work in this space. it really helped me a lot!
It's here. My write-up for CVE-2024-54471. Enjoy :) https://t.co/9yZIel9UVC
0
1
4
I'm considering taking a month off to write a filesystem training for #OBTS. Are any of you guys interested in that?
0
2
24
OBTS v7 "Broken isolation: Draining your Credentials from Popular macOS Password Managers" by @_r3ggi Workstation compromise -> game over. https://t.co/xRDeMNos2z
0
6
11
🧐
New 0 day dropped: https://t.co/r8R2eYrUR5 Conclusion: 1. Don’t trust @thezdi , they are too late to handle our reports. One of my reports was submitted in 2024 Jan, but it is still not disclosed to the vendor. No reply from the ZDI yet! 2. Don’t trust the Parallels security!
0
0
3