No Image

Using Rust in Windows

2019-11-08 KENNETH 0

Using Rust in Windows This Saturday 9th of November, there will be a keynote from Microsoft engineers Ryan Levick and Sebastian Fernandez at RustFest Barcelona. They will be talking about why Microsoft is exploring Rust adoption, some of the challenges we’ve faced in this process, and the future of Rust adoption in Microsoft. If you want to talk with … Using Rust in Windows Read More » The post Using Rust in Windows appeared first on Microsoft Security Response Center. Source: Using Rust in Windows

No Image

Vulnerability hunting with Semmle QL: DOM XSS

2019-11-07 KENNETH 0

Vulnerability hunting with Semmle QL: DOM XSS In two previous blog posts ( part 1 and part 2), we talked about using Semmle QL in C and C++ codebases to find vulnerabilities such as integer overflow, path traversal, and those leading to memory corruption. In this post, we will explore applying Semmle QL to web security by hunting for one of­­­ the … Vulnerability hunting with Semmle QL: DOM XSS Read More » The post Vulnerability hunting with Semmle QL: DOM XSS appeared first on Microsoft Security Response Center. Source: Vulnerability hunting with Semmle QL: DOM XSS

No Image

Time for day 2 of briefings at BlueHat Seattle!

2019-10-26 KENNETH 0

Time for day 2 of briefings at BlueHat Seattle! We hope you enjoyed the first day of our BlueHat briefings and the Bytes of BlueHat reception in our glamping tent (complete with toasted marshmallows). Yesterday, we learned a lot about how XboxOne hardware security has advanced the state of hardware security elsewhere, we heard some surprising correlations between vuln severity, age, and time to … Time for day 2 of briefings at BlueHat Seattle! Read More » The post Time for day 2 of briefings at BlueHat Seattle! appeared first on Microsoft Security Response Center. Source: Time for day 2 of briefings at BlueHat Seattle!

No Image

Welcome to the second stage of BlueHat!

2019-10-25 KENNETH 0

Welcome to the second stage of BlueHat! We’ve finished two incredible days of security trainings at the Living Computer Museum in Seattle. Now it’s time for the second part of BlueHat: the briefings at ShowBox SoDo. We’ve got a big day planned, so head on down. Please join us for breakfast (we have doughnuts! and bacon! and cereal!) when the doors open … Welcome to the second stage of BlueHat! Read More » The post Welcome to the second stage of BlueHat! appeared first on Microsoft Security Response Center. Source: Welcome to the second stage of BlueHat!

No Image

Microsoft Identity Bounty Improvements

2019-10-24 KENNETH 0

Microsoft Identity Bounty Improvements Sharing the latest updates to the Microsoft Identity Bounty Program The post Microsoft Identity Bounty Improvements appeared first on Microsoft Security Response Center. Source: Microsoft Identity Bounty Improvements