Showing 4 results
JDD: In-depth Mining of Java Deserialization Gadget Chains
37:13
Travel & Eventsresearch-presentationhybridjava
Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine
30:13
Travel & Eventsresearch-presentationhybridbluetooth
Bridging the Gap: Type Confusion and Boundary Vulnerabilities Between WebAssembly and JavaScript
40:33
Travel & Eventsresearch-presentationtechnical-deep-divev8
QuickShell: Sharing is Caring About an RCE Attack Chain on Quick Share
38:39
Travel & Eventsresearch-presentationtechnical-deep-divegoogle-quick-share
Powered by Kuboid

We break your app
before they do.

Kuboid is a cybersecurity agency that finds hidden vulnerabilities before real attackers can exploit them. Proactive security testing, so you can ship with confidence.

Get in Touch

Trusted by the security community • Visit kuboid.in