OffensiveCon25 – Android In-The-Wild: Unexpectedly Excavating A Kernel Exploit
文章表达了对OffensiveCon 2025大会及其主办方Binary Gecko的感谢,并推荐了该会议的视频内容。同时提到了Verification Labs及其专家Trey Blalock对会议的推荐。 2025-6-10 15:0:0 Author: securityboulevard.com(查看原文) 阅读量:8 收藏

Author/Presenter: Seth Jenkins

Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the Hilton Berlin; and via the organizations YouTube channel.

Techstrong Gang Youtube

AWS Hub

Thanks and a Tip O’ The Hat to Verification Labs :: Penetration Testing Specialists :: Trey Blalock GCTI, GWAPT, GCFA, GPEN, GPCS, GCPN, CRISC, CISA, CISM, CISSP, SSCP, CDPSE for recommending the OffensiveCon 25 conference.

Permalink

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.youtube-nocookie.com/embed/lnK1iACJ3-c?si=zmNxiNECM3dwyt4P


文章来源: https://securityboulevard.com/2025/06/offensivecon25-android-in-the-wild-unexpectedly-excavating-a-kernel-exploit/?utm_source=rss&utm_medium=rss&utm_campaign=offensivecon25-android-in-the-wild-unexpectedly-excavating-a-kernel-exploit
如有侵权请联系:admin#unsafe.sh