Mobile Applications
Mobile Application Security
Mobile Application Protection Suite (MAPS)
zScan
zKeyBox
zShield
zDefend
Mobile Devices
Mobile Device Security
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Solutions
Mobile Security Solutions by Industry
Financial Services
Federal
Government
Media & Entertainment
Retail
Automotive
Company
Company
About Us
Blog
Careers
Support
Partners
Become a Partner
CONTACT US
☰
Menu
Mobile Applications
›
Mobile Application Security
›
Mobile Application Protection Suite (MAPS)
zScan
zKeyBox
zShield
zDefend
Mobile Devices
›
Mobile Device Security
›
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Solutions
›
Mobile Security Solutions by Industry
›
Financial Services
Federal
Government
Media & Entertainment
Retail
Automotive
Company
›
Company
›
About Us
Blog
Careers
Support
Partners
›
Become a Partner
Adam Donenfeld
CVE-2019-8545: Vulnerability in IOHIDFamily.kext
Threat Research
1 minutes
Jun 10, 2019
Summary A local user may be able to cause unexpected system termination or read kernel memory. Details In the function
CVE-2018-4109: Overwriting kernel memory with a few video packets
Threat Research
4 minutes
Nov 12, 2018
Researchers: Adam Donenfeld (@doadam) Relevant Operating Systems: iOS, tvOS and watchOS CVE: CVE-2018-4109 As a part of zLabs platform research
CVE-2018-4282: Out-of-bounds read vulnerability in AppleT8015PPM.kext
Threat Research
1 minutes
Oct 23, 2018
Researchers: Adam Donenfeld (@doadam) Relevant Operating Systems: iOS, tvOS and watchOS CVE: CVE-2018-4282 Summary As a part of our ongoing mobile
ziVA: Zimperium's iOS Video Audio Kernel Exploit
Threat Research
6 minutes
Aug 24, 2017
Follow @doadam Following my previous post, I’m releasing ziVA: a fully chained iOS kernel exploit that (should) work on all the iOS devices running iOS
Zimperium zLabs iOS Security Advisories
Threat Research
3 minutes
Jul 20, 2017
As part of zLab's platform research team, I've tried to investigate an area of the kernel that wasn't thoroughly researched before. After digging into