Maggie

@_m46s

FW Security Researcher, Radio/EM/physical attack enthusiast. Tweets are my own.

Vrijeme pridruživanja: rujan 2009.

Tweetovi

Blokirali ste korisnika/cu @_m46s

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_m46s

  1. Prikvačeni tweet
    14. sij

    Authored a piece on threat models! While often associated with early stages of software development, the process applies to firmware & hardware as well. Check out the benefits, five key steps, & 's real life EDK II threat model example:

    Poništi
  2. proslijedio/la je Tweet
    prije 21 sat

    Confessions of a Hacker: The Story. Live premiere at 12pm PST on February 6! I've never let a camera crew this much into my life. What could go wrong?

    Poništi
  3. proslijedio/la je Tweet

    looking for an artist to do an awesome silkscreen-able illustration of a hard drive. suggestions?

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    For those who hadn't seen the news announced yesterday at FOSDEM, the conference known as KiCon will be held at CERN this year. You can learn more and sign up for information about tickets/tours(!)/lodging and more on the website:

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    This is how we start the week! What about you? BsidesTLV 2020 CFP is open Submit and share.

    Poništi
  6. proslijedio/la je Tweet
    1. velj

    That’s the most red team thing I’ve ever heard 😂

    Poništi
  7. proslijedio/la je Tweet
    1. velj

    Answering your questions - join Eclypsium's principal researchers, Mickey Shkatov and Jesse Michael for a Q&A about Direct Memory Access (DMA) Attacks. When: Wednesday, February 5, 2020 at 10 a.m. PDT. Register here:

    Poništi
  8. proslijedio/la je Tweet
    31. sij

    The January Eclypsium Firmware Threat Report is now out. Take a look at it here:

    Poništi
  9. proslijedio/la je Tweet
    30. sij
    Poništi
  10. proslijedio/la je Tweet
    30. sij

    My Reverse Engineering C++ Binaries Training will be part of in 😁

    Poništi
  11. proslijedio/la je Tweet
    30. sij

    DMA attacks are often misunderstood as requiring physical access to a device. However, in many cases they can be done remotely, like in this example of exploiting firmware on Nerwork Cards

    Poništi
  12. proslijedio/la je Tweet
    30. sij

    What happened when & looked at HP & Dell laptops for DMA vulnerabilities? They found some. Join them for a Q&A on Feb. 5 to hear more and ask questions. Register here: . ,

    Poništi
  13. proslijedio/la je Tweet
    30. sij

    When Direct Memory Access and some methods for implementing it were designed, “the hardware threat model was very different from today,” -

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    30. sij

    "The actual adoption and correct uses of these features in the hardware …lags significantly behind when the feature is introduced in the marketplace,” .

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    30. sij

    Eclypsium published new research exposing vulnerabilities to DMA attacks in laptops from HP and Dell. Our principal researchers, and show that high speed DMA attacks can bypass hardware protections on enterprise devices.

    Poništi
  16. proslijedio/la je Tweet
    29. sij

    Want to learn about reverse engineering and breaking hardware, but don't know where to start? My 2-day Hardware Hacking Basics class returns for both the weekend and weekday sessions! and

    Poništi
  17. proslijedio/la je Tweet
    29. sij

    Black Hat USA () is back at Mandalay Bay in Las Vegas, August 1-6. Registration is now open and Trainings will fill up fast! Save your seat and lock-in the lowest possible rates:

    Poništi
  18. proslijedio/la je Tweet
    29. sij

    CanSecWest is offering a free training and conference admission to the top 4 talk submissions from someone 25 or younger! All qualifying submissions also get a 10% discount on conference ticket. That’s basically a $5000 USD grant to the top 4 submissions. Please share!

    Poništi
  19. proslijedio/la je Tweet
    28. sij

    My patch to disable PCI device DMA in early boot to avoid gaps in IOMMU coverage just got merged to mainline, so here's a writeup of it:

    Poništi
  20. proslijedio/la je Tweet
    28. sij
    Odgovor korisnicima
    Poništi
  21. proslijedio/la je Tweet
    25. sij

    Great summary of risks and mitigations related to cloud. Easy to see how firmware/hardware fit into this given cloudborne (targeting multi-tenancy), bmc vulns (in supply chain), and myriad of recent hw issues (often config or firmware patch related).

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·