Robuta

Sponsor of the Day: Jerkmate
https://projectzero.google/2026/01/pixel-0-click-part-1.html A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby - Project Zero Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One ef... pixel 9 partexploit chainproject zero01 https://projectzero.google/2026/01/pixel-0-click-part-3.html A 0-click exploit chain for the Pixel 9 Part 3: Where do we go from here? - Project Zero While our previous two blog posts provided technical recommendations for increasing the effort required by attackers to develop 0-click exploit chains, our e... pixel 9 partexploit chainproject zero03 https://projectzero.google/2026/01/pixel-0-click-part-2.html A 0-click exploit chain for the Pixel 9 Part 2: Cracking the Sandbox with a Big Wave - Project Zero With the advent of a potential Dolby Unified Decoder RCE exploit, it seemed prudent to see what kind of Linux kernel drivers might be accessible from the res... pixel 9 partexploit chainbig waveproject zero0