Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @ABazhaniuk
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ABazhaniuk
-
Alex Bazhaniuk proslijedio/la je Tweet
Learn the fundamentals of firmware attacks via
@eclypsium. http://bit.ly/firmware-attack-anatomy … Then master firmware exploitation with@hackingthings,@jessemichael, and@kc8apf at#Ringzer0. http://bit.ly/ringzero-firmware-implants-pt1 …
http://bit.ly/ringzero-firmware-implants-pt2 …pic.twitter.com/wUmQFb3PsB
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
The January Eclypsium Firmware Threat Report is now out. Take a look at it here: http://bit.ly/38XIDI5 pic.twitter.com/A1me5KH9A6
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
Come work with an awesome research team on firmware and hardware threats!https://twitter.com/kc8apf/status/1222786045499981824 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
Our research team
@eclypsium is growing. If you're interested in developing detection methods for PC firmware threats and vulnerabilities, send your resume/CV to careers@eclypsium.com. Portland, USA or Córdoba, Argentina preferred. DMs open for questions.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
I'll be giving trainings similar to what Richard attended at both CanSecWest (https://www.cansecwest.com/dojos/2020/firmimplants.html …) and Ringzer0 (https://ringzer0.training/finding-firmware-implants.html …) this year. If you're unsure it will be useful for you, get in touch and I'll gladly answer questions.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
Eclypsium published new research exposing vulnerabilities to DMA attacks in laptops from HP and Dell. Our principal researchers,
@HackingThings and@jessemichael show that high speed DMA attacks can bypass hardware protections on enterprise devices. http://bit.ly/313EEqN pic.twitter.com/OWhEux8F78
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
What happened when
@hackingthings &@jessemichael looked at HP & Dell laptops for DMA vulnerabilities? They found some. Join them for a Q&A on Feb. 5 to hear more and ask questions. Register here: http://bit.ly/37G5JCB .#FirmwareSecurity#Firmware,#MemoryLanepic.twitter.com/bZXEe9NBxT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
Join Eclypsium's principal researchers
@HackingThings &@Jessemichael for a Q&A on their new research on DMA attacks on Feb. 5. To register go to: http://bit.ly/2GCvmbM .#FirmwareSecurity,#MemoryLane,#Firmware.pic.twitter.com/LSHwxssAcd
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
Been also great working with HP and Dell teams on this complex industry problem. Happy to see firmware updates were released promptly
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
Our new research demonstrates that DMA attacks can compromise firmware (and OS) on enterprise laptops with hardware root of trust capabilities among the best in the industry. Very proud to work with the team here at
@eclypsiumhttps://twitter.com/eclypsium/status/1222867055323623424 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
Great summary of risks and mitigations related to cloud. Easy to see how firmware/hardware fit into this given cloudborne (targeting multi-tenancy), bmc vulns (in supply chain), and myriad of recent hw issues (often config or firmware patch related).https://twitter.com/NSAGov/status/1220062344472092672 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
We've found a bug in CSME on-die ROM!
Intel says it's already targeted by CVE-2019-0090 (https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html …). Security Fuses can be extracted!
Mehlow and Cannon Point chipsets are affected. Stay tuned!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
Untrusted Roots: exploiting vulnerabilities in Intel ACMs by
@flothrone https://www.offensivecon.org/speakers/2020/alexander-ermolov.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
New On the Metal episode w/ @kc8apf
Join us as we discuss impossible bugs, fires in the data center, reverse engineering BMC firmware, BMC vulnerabilities, Cray computers, and Windows NT on MIPS. Yup you heard that right!https://oxide.computer/blog/on-the-metal-7-rick-altherr/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
Since 2016,
#Firmware vulnerabilities have grown a staggering 750%. Read our new article here: http://bit.ly/2THclwx pic.twitter.com/RzVVcPADhR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
Intel Cannon Point chipset (300 series) as well as Apollo Lake and Gemini Lake SoCs have very dangerous Delayed Authentication Mode (DAM) vulnerability allowing arbitrary code execution and the root key prediction. Detailed write-up is coming. Stay tuned.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
Eclypsium’s researchers
@HackingThings and@jessemichael are providing a two day hands-on course in building and using UEFI implants as part of the#CanSecWest 2020: Security Masters Dojo. For information/register: http://bit.ly/2NsdWCp pic.twitter.com/LjB9wXzyKK
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
Listen to On the Metal podcast starring Eclypsium's
@kc8apf. Rick discusses#firmware as the latest attack vector, impossible bugs and the impact these attacks have on organizations. Listen here:http://bit.ly/3ad1jVsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
Join Eclypsium’s top researchers for firmware security courses at
#CanSecWest 2020. For more information/register: Mar 14-15 Practical Firmware Implants- http://bit.ly/2RhgF2y and Mar 16-17 Finding Firmware Implants-http://bit.ly/2tdz9Jm pic.twitter.com/aIU78yQI3u
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex Bazhaniuk proslijedio/la je Tweet
Still catching up on your post-holiday security reading? Get Eclypsium's December Threat Report with the latest research and news on
#firmware security. http://bit.ly/2ZXnLO0 pic.twitter.com/ISv7UMVzFV
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.