SSD Secure Disclosure

113 Followers
2 Following
235 Posts
SSD provides the quick and responsible way to get zero-day vulnerabilities reported to vendors.
Visit https://ssd-disclosure.com/ for more information.

Explore the offensive side of space systems with Romel Marin at TyphoonCon 2026!

See how flaws in space protocols enable RF interception, telemetry abuse, replay attacks, and even command injection from orbit: https://typhooncon.com/2026-agenda/

Yuanzhen Xu will present at TyphoonCon 2026!
Join us as we expose hidden attack paths in ClickHouse - from JDBC components to memshell and RASP evasion: https://typhooncon.com/2026-agenda/
LSASS under the microscope at TyphoonCon 2026!
Erik Egsgard joins our lineup to uncover how even Windows’ most protected process can be turned into an attack surface: https://typhooncon.com/2026-agenda/
Lidor Ben Shitrit is bringing cloud & Java exploitation to TyphoonCon 2026!
“Pre-auth RCE in Enterprise Java” dives into real-world middleware attack paths.
Register at: https://typhooncon.com/2026-agenda/
Don’t miss Connor Du Plooy at TyphoonCon 2026!
“Terminally Bad Credit” dives into rooting, skimming, and hijacking mobile card machines. Read more and get your tickets at: https://typhooncon.com/2026-agenda/

Kirils Solovjovs takes the stage at TyphoonCon 2026!

He’ll dive into reverse engineering the DUOX PLUS intercom system exposing protocol flaws and demonstrating MITM, spoofing, and signal manipulation using simple hardware tools.
https://typhooncon.com/2026-agenda

Alexander Kozlov & Sergey Anufrienko are joining TyphoonCon 2026!

They’ll showcase real-world automotive vulnerabilities: from SMS to cloud attacks and what it means for vehicle security.
Don’t miss it: https://typhooncon.com/2026-agenda/

Aryan Jogia joins the TyphoonCon 2026 lineup.

In his talk, Aryan will explore how attackers can leverage Windows’ own architecture to dismantle modern security tools from userland hooks all the way down to the kernel. ♟💻
https://typhooncon.com/2026-agenda/

Nicola Stauffer and Gürkan Gür will be part of the TyphoonCon 2026 lineup!
In their talk they’ll show how exploiting the firmware of MediaTek’s Wi-Fi 7 MT7925 chip can lead to a full Windows 11 privilege-escalation chain bridging userspace, firmware, and the Windows kernel.