News

OffensiveCon25 – Garbage Collection In V8

  • None--securityboulevard.com
  • published date: 2025-06-04 00:00:00 UTC

None

<p></p><center data-preserve-html-node="true">Authors/Presenters: Richard Abou Chaaya and John Stephenson <p></p><center data-preserve-html-node="true"><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" src="https://www.youtube-nocookie.com/embed/sM2d0ciaeiI?si=ogBf5xlQwEpf37Ne" width="560" frameborder="0" data-preserve-html-node="true" title="YouTube video player" height="315"></iframe> <p>Our sincere appreciation to <strong><a href="https://www.offensivecon.org/">OffensiveCon by Binary Gecko</a></strong>, and the Presenters/Authors for publishing their outstanding <strong><a href="https://www.youtube.com/@OffensiveCon">OffensiveCon 2025</a></strong> video content. Originating from the conference’s events located at the <strong><a href="https://www.hilton.com/en/locations/germany/berlin/">Hilton Berlin</a></strong>; and via the organizations <strong><a href="https://www.youtube.com/@BsideslvOrg/playlists">YouTube</a></strong> channel. </p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwyXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> <div class="ai-rotate-option" style="visibility: hidden; position: absolute; top: 0; left: 0; width: 100%; height: 100%;" data-index="1" data-name="QVdTIEh1Yg==" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://devops.com/builder-community-hub/?ref=in-article-ad-1&amp;utm_source=do&amp;utm_medium=referral&amp;utm_campaign=in-article-ad-1" target="_blank"><img src="https://devops.com/wp-content/uploads/2024/10/Gradient-1.png" alt="AWS Hub"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div> <p>Thanks and a Tip O’ The Hat to <strong><a href="https://www.verificationlabs.com/trey.html">Verification Labs</a></strong> :: Penetration Testing Specialists :: Trey Blalock GCTI, GWAPT, GCFA, GPEN, GPCS, GCPN, CRISC, CISA, CISM, CISSP, SSCP, CDPSE for recommending the OffensiveCon 25 conference.</p> <p></p></center></center><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="c2e9c82a3b7d0b122ec64a62-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="c2e9c82a3b7d0b122ec64a62-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><p><a href="https://www.infosecurity.us/blog/2025/6/4/offensivecon25-garbage-collection-in-v8">Permalink</a></p><p> </p><div class="spu-placeholder" style="display:none"></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.infosecurity.us/">Infosecurity.US</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Marc Handelman">Marc Handelman</a>. Read the original post at: <a href="https://www.youtube-nocookie.com/embed/sM2d0ciaeiI?si=ogBf5xlQwEpf37Ne">https://www.youtube-nocookie.com/embed/sM2d0ciaeiI?si=ogBf5xlQwEpf37Ne</a> </p>