Tweetovi

Blokirali ste korisnika/cu @c7zero

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @c7zero

  1. Prikvačeni tweet
    12. stu 2019.

    W00t! is among the 100 of the world’s most promising start-ups by . So proud of the team!

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Join Eclypsium's principal researchers & for a Q&A on their new research on DMA attacks on Feb. 5. To register go to: . , , .

    Poništi
  3. 31. sij

    Come work with an awesome research team on firmware and hardware threats!

    Poništi
  4. 30. sij

    DMA attacks are often misunderstood as requiring physical access to a device. However, in many cases they can be done remotely, like in this example of exploiting firmware on Nerwork Cards

    Poništi
  5. 30. sij

    Been also great working with HP and Dell teams on this complex industry problem. Happy to see firmware updates were released promptly

    Prikaži ovu nit
    Poništi
  6. 30. sij

    Our new research demonstrates that DMA attacks can compromise firmware (and OS) on enterprise laptops with hardware root of trust capabilities among the best in the industry. Very proud to work with the team here at

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    29. sij

    CanSecWest is offering a free training and conference admission to the top 4 talk submissions from someone 25 or younger! All qualifying submissions also get a 10% discount on conference ticket. That’s basically a $5000 USD grant to the top 4 submissions. Please share!

    Poništi
  8. proslijedio/la je Tweet
    28. sij

    My patch to disable PCI device DMA in early boot to avoid gaps in IOMMU coverage just got merged to mainline, so here's a writeup of it:

    Poništi
  9. proslijedio/la je Tweet
    24. sij

    An excellent blog post by , a highly recommended read! "Executing custom Option ROM on D34010WYK and persisting code in UEFI Runtime Services"

    Poništi
  10. proslijedio/la je Tweet
    22. sij

    We've found a bug in CSME on-die ROM!💥 Intel says it's already targeted by CVE-2019-0090 (). Security Fuses can be extracted! 🔥 Mehlow and Cannon Point chipsets are affected. Stay tuned!

    Poništi
  11. proslijedio/la je Tweet
    22. sij
    Poništi
  12. proslijedio/la je Tweet

    Thanks for sending these over! We will start experimenting with them. design

    Poništi
  13. proslijedio/la je Tweet
    16. sij
    Poništi
  14. proslijedio/la je Tweet
    13. sij

    🚨 New On the Metal episode w/ 🚨 Join us as we discuss impossible bugs, fires in the data center, reverse engineering BMC firmware, BMC vulnerabilities, Cray computers, and Windows NT on MIPS. Yup you heard that right!

    Poništi
  15. proslijedio/la je Tweet
    14. sij

    Listen to On the Metal podcast starring Eclypsium's . Rick discusses as the latest attack vector, impossible bugs and the impact these attacks have on organizations. Listen here:

    Poništi
  16. proslijedio/la je Tweet
    11. sij

    I've created a special branch of my Fenrir IOC scanner to detect traces of activity exploiting CVE-2019-19781 - we use strings that appear in XML & log files - please verify Fenrir branch Report by

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    6. sij

    Still catching up on your post-holiday security reading? Get Eclypsium's December Threat Report with the latest research and news on security.

    Poništi
  18. proslijedio/la je Tweet
    4. sij

    same UEFI DMA attack I demoed at 34c3 still work 2 years later on my brand new high-end laptop with most recent UEFI 😥

    Prikaži ovu nit
    Poništi
  19. 2. sij

    Tesla Wi-Fi firmware and kernel driver exploitation

    Poništi
  20. proslijedio/la je Tweet
    30. pro 2019.

    The December issue of Below The Surface is out now. Get up to date on the latest research, security advisories and industry news in this month's threat report from Eclypsium.

    Poništi
  21. proslijedio/la je Tweet
    27. pro 2019.

    The AMD Secure Processor is a CPU in your CPU you do not control. It’s a Trusted Execution Environment to protect VMs from host access or copyrighted work from distribution. At I will present our PSP hacking and how we regained control over it.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·