Tweetovi

Blokirali ste korisnika/cu @AirbusSecLab

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @AirbusSecLab

  1. 14. sij

    Multiple vulnerabilities: auth bypasses, path traversal and obfuscated password storage in Siemens SiNVR Video Management Solution. . No fix available yet ("Siemens recommends specific countermeasures until fixes are available.").

    Poništi
  2. 11. pro 2019.

    Finally fixed ! Unauthenticated remote command exec and arbitrary file access on CA Autonomic Sysload (CVE-2019-19518)

    Poništi
  3. 4. pro 2019.
    Poništi
  4. proslijedio/la je Tweet
    30. lis 2019.

    📢Alex Matrosov () & Alexandre Gazet will deliver 3-days hands-on training on Hunting UEFI Firmware Implants at Berlin 2020. 🕒22nd - 24th Jan | Germany ℹ️More info & register➡️ cc:

    Prikaži ovu nit
    Poništi
  5. 5. stu 2019.

    Another RCE found by the team has been fixed by Xerox + backdoor accounts restrictions in AltaLink printers:

    Poništi
  6. 18. lis 2019.

    Monday at in , will present BinCAT’s novelties

    Poništi
  7. proslijedio/la je Tweet
    10. lis 2019.

    The final preparations are underway at here in Ghent. Airbus Cyber Innovation's & delivering a multi-level ICS challenge. Come visit us in the village! (We're the good looking ones... :) )

    Poništi
  8. proslijedio/la je Tweet
    10. lis 2019.
    Poništi
  9. proslijedio/la je Tweet
    15. lis 2019.

    Lenovo recently patched EC code execution bug LEN-27764 (CVE-2019-6171) which we present with Alex Gazet at in Vegas. It was reported in the end of April and has coverage across all the main enterprise Thinkpad lines (found on P50 & T540).

    Poništi
  10. 8. kol 2019.

    Slides for our talk "Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller" by Alex Gazet and at

    Poništi
  11. 8. kol 2019.

    If you're at , don't forget to go see Alex Gazet's and 's talk on laptop embedded controllers and BootGuard at 9:45am today: If you miss it, we'll publish the slides after the talk.

    Poništi
  12. 11. lip 2019.
    Prikaži ovu nit
    Poništi
  13. 6. lip 2019.

    Anaïs and Stéphane are presenting Gustave, an embedded OS kernel fuzzer today at SSTIC. Check out the tool in the GitHub repo:

    Poništi
  14. 3. lip 2019.

    Une partie de l'équipe sera présente au , n'hésitez pas à venir nous voir pour discuter :)

    Poništi
  15. 3. lip 2019.

    We have two open positions for senior security evaluators in Paris!

    Poništi
  16. 23. svi 2019.

    ret-sync now supports Ghidra: sync it with your favorite debugger ! Current windows build: (click "Artifacts" to dl)

    Poništi
  17. 17. svi 2019.
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    7. svi 2019.

    Our REsearch ”Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller” with Alexandre Gazet accepted for ! Tons of interesting stuff: Lenovo BIOS Guard bypass, gaining persistence on EC (blindspot for any type of AV) and more

    Prikaži ovu nit
    Poništi
  19. 19. tra 2019.

    NVD fixed the CVSS scores: 9.8 for v3, 10.0 for v2.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    19. tra 2019.

    Say hi to "timeliner", a rewrite of the venerable mactime enhanced with a complete expression engine: no more fights with grep|awk|perl|sort! If you use list_mft, regrippy or tsk, enjoy: Did I tell you we are hiring btw? ✈️

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·