#Quarkslab

Coinpapercoinpaper
2025-11-20

🔍 NEW: completed the first public third-party audit of Core’s codebase, reporting no critical or high-severity issues after a four-month review of its P2P and consensus layers!

N-gated Hacker Newsngate
2025-10-15

Ah, another *riveting* tale of tech wizards turning software quirks into security nightmares 🎩✨. NVIDIA's drivers are as stable as a unicycle on a tightrope, and is here to make sure everyone knows it, because apparently, there are not enough blogs to repeat their name 🥱📝.
blog.quarkslab.com/./nvidia_gp

Hacker Newsh4ckernews
2025-06-29
Jeroen Ruigrok van der Wervenasmodai
2024-08-21

Major Backdoor in Millions of RFID Cards Allows Instant Cloning

Backdoor in millions of contactless cards made by Shanghai Fudan Microelectronics allows instantaneous cloning of RFID smart cards used to open office doors and hotel rooms around the world.

securityweek.com/major-backdoo

2024-01-16

Vulnerabilities in EDK2 NetworkPkg IP stack implementation.

kb.cert.org/vuls/id/132380

#UEFI #infosec #pixiefail

> Multiple vulnerabilities were discovered in the TCP/IP stack (NetworkPkg) of Tianocore EDKII, an open source implementation of Unified Extensible Firmware Interface (UEFI). Researchers at Quarkslab have identified a total of 9 vulnerabilities that if exploited via network can lead to remote code execution, DoS attacks, DNS cache poisoning, and/or potential leakage of sensitive information. #Quarkslab have labeled these set of related vulnerabilities as PixieFail.

Christophe Brocas :salt:cbrocas@infosec.exchange
2022-12-13

Congratulations @cryptocorn 💙​ for your #pwn2own experience with #quarkslab team ( Robin David, Benoit Forgette and @virtualabs )!

#pwn2own 2022 Toronto wrap up: youtube.com/watch?v=bJkod2sJTH

#StepByStep accomplishment 👏​
#ProudFather 😇​

2021-04-30

se vi interessa è uscito il report degli audit formali di session , fatti da quarkslab:

blog.quarkslab.com/audit-of-se

se non ho capito male però solo durante l'ultimo audit del client desktop era già stato implementato il nuovo protocollo

Dicono che alcune vulnerabilità (in teoria quelle più rilevanti), riscontrate negli audit sono già state fixate:

getsession.org/session-code-au

#session #audit #quarkslab #privacy #security #freesoftware #messenger #opensource #foss #oxen #sicurezza #metadata #metadati

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst