Alex Bazhaniuk

@ABazhaniuk

Founder and CTO at

California, USA
Vrijeme pridruživanja: svibanj 2011.

Tweetovi

Blokirali ste korisnika/cu @ABazhaniuk

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ABazhaniuk

  1. proslijedio/la je Tweet
    22. sij
    Poništi
  2. proslijedio/la je Tweet
    31. sij

    The January Eclypsium Firmware Threat Report is now out. Take a look at it here:

    Poništi
  3. proslijedio/la je Tweet
    31. sij

    Come work with an awesome research team on firmware and hardware threats!

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Our research team is growing. If you're interested in developing detection methods for PC firmware threats and vulnerabilities, send your resume/CV to careers@eclypsium.com. Portland, USA or Córdoba, Argentina preferred. DMs open for questions.

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    I'll be giving trainings similar to what Richard attended at both CanSecWest () and Ringzer0 () this year. If you're unsure it will be useful for you, get in touch and I'll gladly answer questions.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    30. sij

    Eclypsium published new research exposing vulnerabilities to DMA attacks in laptops from HP and Dell. Our principal researchers, and show that high speed DMA attacks can bypass hardware protections on enterprise devices.

    Poništi
  7. proslijedio/la je Tweet
    30. sij

    What happened when & looked at HP & Dell laptops for DMA vulnerabilities? They found some. Join them for a Q&A on Feb. 5 to hear more and ask questions. Register here: . ,

    Poništi
  8. proslijedio/la je Tweet
    30. sij

    Join Eclypsium's principal researchers & for a Q&A on their new research on DMA attacks on Feb. 5. To register go to: . , , .

    Poništi
  9. proslijedio/la je Tweet
    30. sij

    Been also great working with HP and Dell teams on this complex industry problem. Happy to see firmware updates were released promptly

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    30. sij

    Our new research demonstrates that DMA attacks can compromise firmware (and OS) on enterprise laptops with hardware root of trust capabilities among the best in the industry. Very proud to work with the team here at

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    25. sij

    Great summary of risks and mitigations related to cloud. Easy to see how firmware/hardware fit into this given cloudborne (targeting multi-tenancy), bmc vulns (in supply chain), and myriad of recent hw issues (often config or firmware patch related).

    Poništi
  12. proslijedio/la je Tweet
    22. sij

    We've found a bug in CSME on-die ROM!💥 Intel says it's already targeted by CVE-2019-0090 (). Security Fuses can be extracted! 🔥 Mehlow and Cannon Point chipsets are affected. Stay tuned!

    Poništi
  13. proslijedio/la je Tweet
    21. sij

    Untrusted Roots: exploiting vulnerabilities in Intel ACMs by

    Poništi
  14. proslijedio/la je Tweet
    13. sij

    🚨 New On the Metal episode w/ 🚨 Join us as we discuss impossible bugs, fires in the data center, reverse engineering BMC firmware, BMC vulnerabilities, Cray computers, and Windows NT on MIPS. Yup you heard that right!

    Poništi
  15. proslijedio/la je Tweet
    21. sij

    Since 2016, vulnerabilities have grown a staggering 750%. Read our new article here:

    Poništi
  16. proslijedio/la je Tweet
    20. sij

    Intel Cannon Point chipset (300 series) as well as Apollo Lake and Gemini Lake SoCs have very dangerous Delayed Authentication Mode (DAM) vulnerability allowing arbitrary code execution and the root key prediction. Detailed write-up is coming. Stay tuned.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    14. sij

    Eclypsium’s researchers and are providing a two day hands-on course in building and using UEFI implants as part of the 2020: Security Masters Dojo. For information/register:

    Poništi
  18. proslijedio/la je Tweet
    14. sij

    Listen to On the Metal podcast starring Eclypsium's . Rick discusses as the latest attack vector, impossible bugs and the impact these attacks have on organizations. Listen here:

    Poništi
  19. proslijedio/la je Tweet
    14. sij

    Join Eclypsium’s top researchers for firmware security courses at 2020. For more information/register: Mar 14-15 Practical Firmware Implants- and Mar 16-17 Finding Firmware Implants-

    Poništi
  20. proslijedio/la je Tweet
    6. sij

    Still catching up on your post-holiday security reading? Get Eclypsium's December Threat Report with the latest research and news on security.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·