Thinking about this as I write solutions for all the #xbow benchmarks
Jack of all cyber security, occasional dabbler in vulnerability research. Windows Internals teacher
www.acepace.net
https://github.com/acepace
Co creator of the Infection Monkey
Jack of all cyber security, occasional dabbler in vulnerability research. Windows Internals teacher
www.acepace.net
https://github.com/acepace
Co creator of the Infection Monkey
I’ve been waiting a long time to see this out in the open.
Memory Integrity Enforcement delivers the strongest memory safety mitigations in the industry—by far. It sets a new standard for device security.
@shac posted a nice story a while ago, about the first 64-bit ARM architecture: over 12 years ago, Apple launched the iPhone 5s and introduced the ARM64 CPU. It was the first public disclosure of a 64-bit ARM architecture. No one else was even close to having a chip ready to tape out, let alone ship in a product—and the performance was a Frankenstein.
But what is often overlooked is the execution. When iOS shipped, it was a full 64-bit native release. There was no 32-bit code in the OS image (beyond the components required to support 32-bit third-party apps). Everything was aligned to the new architecture, including complex subsystems like the Safari JavaScript engine. Everything was ready on day one.
**This level of execution is something only Apple can deliver.**
And today, we see the same capabilities applied to security.
I’m deeply grateful to have been part of the exceptional team that worked tirelessly to make this happen.
This blog post took me two days to write. I hope someone out there enjoys it, because I sure didn't.
https://nibblestew.blogspot.com/2025/08/we-need-to-seriously-think-about-what.html
So how come with two decades of XSS, there are zero papers trying to model html interactions to define formally define XSS vulnerabilities?
Not sure what to tag for reach
BluehatIL 2025 CFP is open!
It's a great stage and a fun conference. Probably the best Israel has to offer
Go submit😺
https://www.microsoftrnd.co.il/bluehatil/conference/CFP
#cfp #defense #vulnerability #conference