F-Secure Labs

@FSecureLabs

With great research comes great responsibility.

Vrijeme pridruživanja: siječanj 2010.

Tweetovi

Blokirali ste korisnika/cu @FSecureLabs

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @FSecureLabs

  1. proslijedio/la je Tweet
    27. sij

    Absolutely stoked to be speaking alongside at Objective by the Sea v3 in Hawaii in March! 🏝

    Poništi
  2. 27. sij

    It's Mighty^MorphoManager^in' Time! - Activate pwnage, power of RCE! Courtesy of Knud -

    Poništi
  3. 17. sij

    From zero to hero in 1, EC2 steps... tales of bashing around in the cloud from labs’ Christian the real IAM when it comes to pwning AWS

    Poništi
  4. 24. pro 2019.

    Credits go to

    Prikaži ovu nit
    Poništi
  5. 24. pro 2019.
    Prikaži ovu nit
    Poništi
  6. 20. pro 2019.

    Interested in Smart TV hacking but don't know where to start? We've done all the legwork for you on the Samsung Q60 TV by

    Poništi
  7. 16. pro 2019.

    Barco Click2Pwn the Easy Wireless Penetration System. Easy integration into the company network for all your APT needs. Share your screen and secrets with 1 click by

    Poništi
  8. proslijedio/la je Tweet

    New from : Digital Lock-Picking – Stealing Keys to the Kingdom.🔒 Read and Michał Madziar's new research on a KeyWe Smart Lock flaw that allows thieves to eavesdrop on messages between the lock and phone app. |

    Poništi
  9. 11. pro 2019.
    Poništi
  10. 9. pro 2019.

    If you use the Net2 Access Control system you might want to check out this advisory by Knud:

    Poništi
  11. 4. pro 2019.

    Are you avian a hard time with AWS? Of corvus we know such auspices are very hard to read. Why not aves a go with awspx from our resident augur Craig Koorn.

    Poništi
  12. 26. stu 2019.

    You gotta be kidding Mi - We just published the Xiaomi Pwn2Own 2018 advisories, which were patched just before Pwn2Own 2019, for silent APK install in the Browser and WiFi categories by and

    Poništi
  13. 20. stu 2019.

    "Fine, I'll make my own tool!" The story of how had to devise his own way of exploiting an Informix SQL Injection vulnerability

    Poništi
  14. 15. stu 2019.

    Two security researchers went on a web app test and you won't believe what overflowed next: check out our new blog post "Prince of the Honeycomb" by

    Poništi
  15. proslijedio/la je Tweet

    Confirmed! The crew used an bug in the NFC component of the Mi9 to exfiltrate data just by touching their specially made NFC tag. Their efforts earned $30,000 and 3 more Master of Pwn points.

    Poništi
  16. proslijedio/la je Tweet

    Success! The crew was able to exfiltrate a picture from the Mi9 handset just by touching it to a rogue NFC tag. The photo transferred slowly, but it definitely worked. They're headed to the disclosure room for verification.

    Poništi
  17. proslijedio/la je Tweet

    Confirmed! The team combined a command injection bug along with some insecure settings to achieve their code execution (and Snake-themed light display). The effort earns them $20,000 and one Master of Pwn point.

    Poništi
  18. proslijedio/la je Tweet

    Success! Not only did the team get their code execution working on the TP-Link AC1750 via the WAN interface, they got the front lights of the router to play Snake!

    Poništi
  19. 6. stu 2019.

    OU having a laugh? How edit rights on an OU can allow you to compromise any of its computer or user members by

    Poništi
  20. proslijedio/la je Tweet

    Success! After installing a rouge app on their first attempt, the team was able to exfiltrate a picture from the Mi9 on their second attempt. They're headed to the disclosure room to go over all the details.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·