top of page

BLOG
Search


Komodo Research
May 30, 20193 min read
When all else fails - find a 0-day
How a failing red-team engagement led us to find a silly zero day.
And why “insecure by default” is still an issue in 2019.
8,258 views20 comments


Komodo Research
Jan 13, 20193 min read
FROM PUSH NOTIFICATIONS TO A BOTNET
One push too far / part 3 As we saw in part 1 and part 2 of this article series, we can use malicious notifications to gain persistent...
136 views0 comments
bottom of page