@vladhiewsha Profile picture

Vlad Stolyarov

@vladhiewsha

Security Engineer @Google | A byte consists of 8 bits!

Joined March 2017
Similar User
Boris Larin photo

@oct0xor

Leonid Bezvershenko photo

@bzvr_

Igor Kuznetsov photo

@2igosha

Jordy Zomer photo

@pwningsystems

Bruno Braga photo

@cyberspartansec

Silas Cutler (p1nk) photo

@silascutler

Samuel Groß photo

@5aelo

Georgy Kucherin photo

@kucher1n

billy leonard photo

@billyleonard

Antti Tikkanen photo

@anttitikkanen

Joxean Koret (@joxean@mastodon.social) photo

@matalaz

Mark photo

@_marklech_

clem1 photo

@_clem1

stephen photo

@_tsuro

Sergey Lozhkin photo

@61ack1ynx

Vlad Stolyarov Reposted

New joint TAG/Mandiant research on a hybrid Russian espionage/influence campaign (UNC5812) targeting potential Ukrainian military recruits with malware and spreading anti-mobilization narratives cloud.google.com/blog/topics/th…


Vlad Stolyarov Reposted

We're naming names 🔥 because the harm is not hypothetical. Today we share "Buying Spying", our new report diving into the commercial surveillance/spyware industry. We dive into the players, the campaigns, the spyware, & the harm it perpetuates. blog.google/threat-analysi…

Tweet Image 1

Vlad Stolyarov Reposted

Announcing the latest report from Threat Analysis Group documents the rise of commercial surveillance vendors and the industry that threatens free speech, the free press and the open internet blog.google/threat-analysi… Some highlights below. 🧵


Vlad Stolyarov Reposted

💪🏼 Yesterday @_clem1 and @vladhiewsha discovered and reported a new ITW 0-day to the Chrome team. TODAY, 1 day later, Chrome has a fix out to protect users!!! Thank you, Chrome! CVE-2023-7024 chromereleases.googleblog.com/2023/12/stable…


Awesome work from @oct0xor !

Today Apple released updates for CVE-2023-32434 (Kernel) and CVE-2023-32435 (WebKit) in-the-wild zero-days which were discovered by us (@kucher1n, @bzvr_ and yours truly) in the #iOSTriangulation attacks. Update your iOS/iPadOS/macOS/watchOS now!

Tweet Image 1


Vlad Stolyarov Reposted

Today Apple released updates for CVE-2023-32434 (Kernel) and CVE-2023-32435 (WebKit) in-the-wild zero-days which were discovered by us (@kucher1n, @bzvr_ and yours truly) in the #iOSTriangulation attacks. Update your iOS/iPadOS/macOS/watchOS now!

Tweet Image 1

Vlad Stolyarov Reposted

I just published a new RCA for CVE-2023-26369, the PDF 0-day that was used in the following campaign. googleprojectzero.github.io/0days-in-the-w…

North Korean actors 🇰🇵 are targeting security researchers again including use of at least one 0-day. IOCs in the blog ⬇️ If you've been in contact, please reach out blog.google/threat-analysi…

Tweet Image 1


Vlad Stolyarov Reposted

Snap is hiring security engineers for D&R and threat intel roles in Switzerland (we have offices in Zurich and Yverdon-les-Bains): wd1.myworkdaysite.com/recruiting/sna… & wd1.myworkdaysite.com/recruiting/sna… Retweets for visibility are much appreciated!


Welcome to TAG, Maddie! Let's burn some 0-days now 🔥

btw...I've moved to Google TAG!!🎉⚡️💃🏽 We're building a team focused on ITW 0days & commercial surveillance vendors, combining the ITW work from Project Zero and TAG into this one new team. I couldn't be more excited to work with @_clem1 @benoitsevens & @vladhiewsha on this!



Vlad Stolyarov Reposted

btw...I've moved to Google TAG!!🎉⚡️💃🏽 We're building a team focused on ITW 0days & commercial surveillance vendors, combining the ITW work from Project Zero and TAG into this one new team. I couldn't be more excited to work with @_clem1 @benoitsevens & @vladhiewsha on this!

🎯@vladhiewsha @_clem1, Bahare, and I from Google TAG, discovered two new in-the-wild 0-days that were patched today: CVE-2023-36874 and CVE-2023-36884. Big thanks to Microsoft for the quick turn around on patches! 👏🏽 #itw0days msrc.microsoft.com/update-guide/v… msrc.microsoft.com/update-guide/v…

Tweet Image 1


Vlad Stolyarov Reposted

🎯@vladhiewsha @_clem1, Bahare, and I from Google TAG, discovered two new in-the-wild 0-days that were patched today: CVE-2023-36874 and CVE-2023-36884. Big thanks to Microsoft for the quick turn around on patches! 👏🏽 #itw0days msrc.microsoft.com/update-guide/v… msrc.microsoft.com/update-guide/v…

Tweet Image 1

Vlad Stolyarov Reposted

Security Updates for July 2023 are now available! Details are here: msft.it/6014glqFs #PatchTuesday #SecurityUpdateGuide

Tweet Image 1

Vlad Stolyarov Reposted

Cool SmartScreen bypass 🔑 found being used ITW by @benoitsevens and @vladhiewsha from @Google TAG! Observed being used to deliver Magniber ransomware 🔒💰. Details in here: blog.google/threat-analysi… Sample: virustotal.com/gui/file/8efb4…


Vlad Stolyarov Reposted

TAG continues our coverage of commercial spyware vendors with a blog post by @_clem1 & @benoitsevens on Variston's Heliconia exploitation framework. blog.google/threat-analysi…


Vlad Stolyarov Reposted

BumbleBee: Round Two ➡️Initial Access: Bumblebee ISO>LNK>DLL ➡️Persistence: AnyDesk, Added Local Admin ➡️Discovery: LOLbins, AdFind ➡️Credentials: LSASS Dump ➡️Lateral: SMB, Remote Services, RDP ➡️C2: Bumblebee, Meterpreter, CobaltStrike thedfirreport.com/2022/09/26/bum…


Vlad Stolyarov Reposted

Vlad Stolyarov Reposted

BumbleBee Roasts Its Way to Domain Admin ➡️Initial Access: BumbleBee (zipped ISO /w LNK+DLL) ➡️Persistence: AnyDesk ➡️Discovery: VulnRecon, Seatbelt, AdFind, etc. ➡️Credentials: Kerberoast, comsvcs.dll, ProcDump ➡️C2: BumbleBee, CobaltStrike, AnyDesk thedfirreport.com/2022/08/08/bum…


Vlad Stolyarov Reposted

12 years ago, I started at Google to join a new team of five with the mission to take on serious threats. Celebrating our anniversary today in Zurich. Impressed with the work of the team every day and the great people we've hired over the years. Cake!

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.