
Andrey Kovalev
@avkovaleff
Followers
424
Following
1K
Media
25
Statuses
2K
Security engineer at @Google. Tweets are my own.
Mountain View, CA
Joined April 2009
RT @argvee: Today as part of our commitment to transparency in this space, we are proud to announce that we have reported the first 20 vuln….
0
51
0
RT @JeffDean: See mathematician Michel van Garrel talking about how our latest Gemini Deep Think model was able to prove a conjecture using….
0
76
0
RT @GoogleOSS: Protect your systems from leaked credentials! 🚨 We're excited to announce Veles, a new open-source secret and credential sca….
0
20
0
RT @opzero_en: 101 Chrome Exploitation — Part 0: Preface . We are starting a new series on modern browsers' architecture and their exploita….
0
70
0
RT @royalhansen: "Developed by @GoogleDeepMind & @Google P0, Big Sleep can help security researchers find 0-day sw security vulnerabilities….
cloud.google.com
Google Threat Intelligence’s Sandra Joyce details a remarkable achievement from our Big Sleep AI agent in this newsletter.
0
3
0
RT @midwestneil: Turns out you can just hack any train in the USA and take control over the brakes. This is CVE-2025-1727 and it took me 12….
0
564
0
RT @GreyNoiseIO: GreyNoise Discovers Stealthy Backdoor Campaign Targeting ASUS Routers. Attacker tradecraft reflects APT-like behavior: qui….
greynoise.io
GreyNoise uncovers a stealth campaign exploiting ASUS routers, enabling persistent backdoor access via CVE-2023-39780 and unpatched techniques. Learn how attackers evade detection, how GreyNoise...
0
20
0
RT @deedydas: It’s happening. AI models are finding zero-day vulnerabilities. This blog post is a must-read and marks a new era for cyb….
0
909
0
RT @Mandiant: In 2024, attackers exploited 75 zero-days across end-user platforms and enterprise tech. Google’s latest report unpacks what….
0
43
0
RT @philvenables: New Google DeepMind research: novel framework to evaluate AI cyberattack capabilities across the entire attack chain. Gro….
0
13
0
RT @taviso: You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials. https://t….
bughunters.google.com
This blog post covers the full details of EntrySign, the AMD Zen microcode signature validation vulnerability recently discovered by the Google Security team.
0
522
0
RT @royalhansen: "If you've ever wondered “how expensive should this LLM be to train” or “how much memory do I need to serve this model mys….
0
2
0
Today Google announced a new OSV-SCALIBR: A library for Software composition analysis. It allows to extract software dependencies, generate SBOM’s and scan them via . More details in our blogpost:
security.googleblog.com
Posted by Erik Varga, Vulnerability Management, and Rex Pan, Open Source Security Team In December 2022, we announced OSV-Scanner , a tool t...
0
4
7
RT @binitamshah: Exploitation Walkthrough and Techniques - Ivanti Connect Secure RCE (CVE-2025-0282) :
labs.watchtowr.com
As we saw in our previous blogpost, we fully analyzed Ivanti’s most recent unauthenticated Remote Code Execution vulnerability in their Connect Secure (VPN) appliance. Specifically, we analyzed...
0
7
0
RT @itswillis: It doesn't happen very often, but Project Zero is hiring!. Please share with anyone you think would….
0
95
0
RT @GoogleVRP: 📯 Announcing the top 20 Chrome VRP researchers for 2024: 📯.Congratulations to everyone on the list!….
0
22
0
RT @RGB_Lights: A story about my Christmas obsession!.
theregister.com
Rob Joyce explains how it's done
0
24
0