Alex Bazhaniuk

@ABazhaniuk

Founder and CTO at

California, USA
Vrijeme pridruživanja: svibanj 2011.

Medijski sadržaj

  1. 3. ruj 2019.

    Critical vulnerabilities in Virtual Media SW stack in Supermicro BMC (X9-X11) opens servers to remote attack. 47k servers with their BMCs exposed to the Internet and using the relevant protocol.Details at Great job

  2. 10. kol 2019.

    Today at 3pm in Track 1 & will present how vulnerabilities in signed kernel drivers can compomise platform security. Fundamental and reputable issues, many vendors affected:

  3. 23. srp 2019.

    We have expanded our training in firmware security to include material centered on best practices and limitations of incident response (IR) and forensics for firmware and hardware of the enterprise devices:

  4. 18. srp 2019.

    As part of our firmware security training we are providing information on the detection and limitations of implants such as Lojax (form APT28) along with methods for implementing an anti-evasion strategy:

  5. 17. srp 2019.

    . found 2 critical vulns in Vertiv/Avocent BMC FW which were used by at least 8 OEMs: Many systems remain without fixes. None are patched for the lack of signature verification. Using 3rd party code increases attack surface & supply chain risk

  6. 16. srp 2019.

    We've heavily improved our firmware security training (changed/added 400+ slides)- including new details about ME/AMT vulnerabilities from recent years, new BMC vulnerabilities, & practical exercises in these and other topics:

  7. 26. velj 2019.

    In our latest research we demonstrate hardware/firmware risks with the whole concept of multi-tenancy in the cloud. It is a critical architecture vulnerability with bare metal cloud providers:

  8. 26. velj 2019.

    Our latest research regarding a critical architecture vulnerability with bare metal cloud providers.Attackers may have the ability to install an implant into BMC firmware and persist in cloud infrastructure after deprovisioning:

  9. 6. ruj 2018.

    We published a new research about vulnerability in Supermicro BMCs (from X8 to X11 gen) which can be compromised from software to take full control (implant BMC or System Firmware) or even brick a system: with &

  10. 28. kol 2018.
  11. 16. kol 2018.
  12. 16. kol 2018.

    Slides of our "Remotely Attacking System Firmware" presentation. We demonstrated 100% reliable RCE exploit in the UEFI system firmware : // with

  13. 7. kol 2018.

    Don't miss our presentation "Remotely Attacking System Firmware" with & at tomorrow 1:30pm in South Pacific F:

  14. 2. velj 2018.

    Awesome presentation with RCE on Cisco ASA: " Robin Hood vs Cisco ASA AnyConnect" from at

  15. 6. stu 2017.

    Video of our talk "Driving down the rabbit hole" about car hacking is up: with

  16. 29. ruj 2017.

    Great talk by about Mac efi security at . Awesome research : https://t.co/16OMt2bUL0?amp=1

  17. 28. ruj 2017.

    . very cool talk about reverse engineering of samsung trustzone at :

  18. 16. kol 2017.
  19. 10. kol 2017.
  20. 5. tra 2017.

    Wow! Look what i found during BIOS whitelist creation from vendors images: BackDoor modules.Looks interesting. Need more time for RE images

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·