CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence Dec 16, 2025

Welcome to the new Project Zero Blog

Google Project Zero Archived Mar 16, 2026 ✓ Full text saved

While on Project Zero, we aim for our research to be leading-edge, our blog design was … not so much. We welcome readers to our shiny new blog! For the occasion, we asked members of Project Zero to dust off old blog posts that never quite saw the light of day. And while we wish we could say the techniques they cover are no longer relevant, there is still a lot of work that needs to be done to protect users against zero days. Our new blog will continue to shine a light on the capabilities of atta

Full text archived locally
✦ AI Summary · Claude Sonnet


    While on Project Zero, we aim for our research to be leading-edge, our blog design was … not so much. We welcome readers to our shiny new blog! For the occasion, we asked members of Project Zero to dust off old blog posts that never quite saw the light of day. And while we wish we could say the techniques they cover are no longer relevant, there is still a lot of work that needs to be done to protect users against zero days. Our new blog will continue to shine a light on the capabilities of attackers and the many opportunities that exist to protect against them. From 2016: Windows Exploitation Techniques: Race conditions with path lookups by James Forshaw From 2017: Thinking Outside The Box by Jann Horn
    💬 Team Notes
    Article Info
    Source
    Google Project Zero
    Category
    ◉ Threat Intelligence
    Published
    Dec 16, 2025
    Archived
    Mar 16, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗