Sponsor of the Day:
Jerkmate
https://projectzero.google/2026/01/pixel-0-click-part-1.html
A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby - Project Zero
Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One ef...
pixel 9 partexploit chainproject zero01
https://projectzero.google/2026/01/pixel-0-click-part-3.html
A 0-click exploit chain for the Pixel 9 Part 3: Where do we go from here? - Project Zero
While our previous two blog posts provided technical recommendations for increasing the effort required by attackers to develop 0-click exploit chains, our e...
pixel 9 partexploit chainproject zero03
https://projectzero.google/2026/01/pixel-0-click-part-2.html
A 0-click exploit chain for the Pixel 9 Part 2: Cracking the Sandbox with a Big Wave - Project Zero
With the advent of a potential Dolby Unified Decoder RCE exploit, it seemed prudent to see what kind of Linux kernel drivers might be accessible from the res...
pixel 9 partexploit chainbig waveproject zero0