Your podcast isn't special
projectzero.google/2026/01/pixe...
projectzero.google/2026/01/pixe...
- Giving you source code, betting on people not thinking source will be malware
- Typo-squatting a package just for this
- Putting malicious code on a single line so far off to the side the code editor doesn't show it unless you are willing to scroll
- Giving you source code, betting on people not thinking source will be malware
- Typo-squatting a package just for this
- Putting malicious code on a single line so far off to the side the code editor doesn't show it unless you are willing to scroll
See it the way it was originally accessed (line-mode browser simulator): line-mode.cern.ch/www/hypertex...
See it the way it was originally accessed (line-mode browser simulator): line-mode.cern.ch/www/hypertex...
www.youtube.com/watch?v=vU1-...
www.youtube.com/watch?v=vU1-...
googleprojectzero.blogspot.com/2025/12/a-lo...
#android #exploit #vulnerability #zeroclick #exploitation #mobilesecurity
googleprojectzero.blogspot.com/2025/12/a-lo...
#android #exploit #vulnerability #zeroclick #exploitation #mobilesecurity
www.documentcloud.org/documents/26...
www.documentcloud.org/documents/26...
Kudos to OCaml's maintainers for handling this so gracefully.
Report also has interesting stories about state actors' AI use.