Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @c7zero
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @c7zero
-
Prikvačeni tweet
W00t!
@eclypsium is among the 100 of the world’s most promising start-ups by@CNBC. So proud of the team! https://www.cnbc.com/upstart/ pic.twitter.com/kF0xWuS9uv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yuriy Bulygin proslijedio/la je Tweet
Join Eclypsium's principal researchers
@HackingThings &@Jessemichael for a Q&A on their new research on DMA attacks on Feb. 5. To register go to: http://bit.ly/2GCvmbM .#FirmwareSecurity,#MemoryLane,#Firmware.pic.twitter.com/LSHwxssAcd
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Come work with an awesome research team on firmware and hardware threats!https://twitter.com/kc8apf/status/1222786045499981824 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DMA attacks are often misunderstood as requiring physical access to a device. However, in many cases they can be done remotely, like in this example of exploiting firmware on Nerwork Cardshttps://twitter.com/evil_x_/status/1222972323831209987 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Been also great working with HP and Dell teams on this complex industry problem. Happy to see firmware updates were released promptly
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Our new research demonstrates that DMA attacks can compromise firmware (and OS) on enterprise laptops with hardware root of trust capabilities among the best in the industry. Very proud to work with the team here at
@eclypsiumhttps://twitter.com/eclypsium/status/1222867055323623424 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yuriy Bulygin proslijedio/la je Tweet
CanSecWest is offering a free training and conference admission to the top 4 talk submissions from someone 25 or younger! All qualifying submissions also get a 10% discount on conference ticket. That’s basically a $5000 USD grant to the top 4 submissions. Please share!https://twitter.com/dragosr/status/1222642402738888704 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yuriy Bulygin proslijedio/la je Tweet
My patch to disable PCI device DMA in early boot to avoid gaps in IOMMU coverage just got merged to mainline, so here's a writeup of it: https://mjg59.dreamwidth.org/54433.html
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yuriy Bulygin proslijedio/la je Tweet
An excellent blog post by
@teddyreedv , a highly recommended read! "Executing custom Option ROM on D34010WYK and persisting code in UEFI Runtime Services"https://casualhacking.io/blog/2020/1/4/executing-custom-option-rom-on-nucs-and-persisting-code-in-uefi-runtime-services …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yuriy Bulygin proslijedio/la je Tweet
We've found a bug in CSME on-die ROM!
Intel says it's already targeted by CVE-2019-0090 (https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html …). Security Fuses can be extracted!
Mehlow and Cannon Point chipsets are affected. Stay tuned!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yuriy Bulygin proslijedio/la je Tweet
Learn the fundamentals of firmware attacks via
@eclypsium. http://bit.ly/firmware-attack-anatomy … Then master firmware exploitation with@hackingthings,@jessemichael, and@kc8apf at#Ringzer0. http://bit.ly/ringzero-firmware-implants-pt1 …
http://bit.ly/ringzero-firmware-implants-pt2 …pic.twitter.com/wUmQFb3PsB
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yuriy Bulygin proslijedio/la je Tweet
Thanks
@c7zero for sending these over! We will start experimenting with them.@HackingThings designpic.twitter.com/LTmXOtdMQS
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yuriy Bulygin proslijedio/la je Tweet
An important op-ed from Intel's Maggie Jauregui (
@_m46s):https://thenextweb.com/podium/2020/01/14/how-to-implement-a-threat-model-to-beef-up-your-organizations-security/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yuriy Bulygin proslijedio/la je Tweet
New On the Metal episode w/ @kc8apf
Join us as we discuss impossible bugs, fires in the data center, reverse engineering BMC firmware, BMC vulnerabilities, Cray computers, and Windows NT on MIPS. Yup you heard that right!https://oxide.computer/blog/on-the-metal-7-rick-altherr/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yuriy Bulygin proslijedio/la je Tweet
Listen to On the Metal podcast starring Eclypsium's
@kc8apf. Rick discusses#firmware as the latest attack vector, impossible bugs and the impact these attacks have on organizations. Listen here:http://bit.ly/3ad1jVsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yuriy Bulygin proslijedio/la je Tweet
I've created a special branch of my Fenrir IOC scanner to detect traces of activity exploiting
#Citrix#Nescaler CVE-2019-19781 - we use strings that appear in XML & log files - please verify Fenrir branch https://github.com/Neo23x0/Fenrir/tree/netscaler … Report by@TrustedSec https://www.trustedsec.com/blog/netscaler-remote-code-execution-forensics/ …pic.twitter.com/tSvmEYWw8j
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yuriy Bulygin proslijedio/la je Tweet
Still catching up on your post-holiday security reading? Get Eclypsium's December Threat Report with the latest research and news on
#firmware security. http://bit.ly/2ZXnLO0 pic.twitter.com/ISv7UMVzFV
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yuriy Bulygin proslijedio/la je Tweet
same UEFI DMA attack I demoed at 34c3 still work 2 years later on my brand new high-end laptop with most recent UEFI
pic.twitter.com/JHHHT2n8hx
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tesla Wi-Fi firmware and kernel driver exploitationhttps://twitter.com/keen_lab/status/1212587186970738688 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yuriy Bulygin proslijedio/la je Tweet
The December issue of Below The Surface is out now. Get up to date on the latest
#firmware research, security advisories and industry news in this month's threat report from Eclypsium. http://bit.ly/2SFsi64 pic.twitter.com/udh2slkt3C
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yuriy Bulygin proslijedio/la je Tweet
The AMD Secure Processor is a CPU in your CPU you do not control. It’s a Trusted Execution Environment to protect VMs from host access or copyrighted work from distribution. At
#36c3 I will present our PSP hacking and how we regained control over it. https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10942.html …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.