-
Not a native English speaker - so I hope you will find my talk interesting and helpful :) Selling 0days to governments and offensive security companies
#BHUSA https://youtu.be/ZDHHGZlEfsQ -
Our
#BHUSA talk recording "Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller" is up! https://youtu.be/g-1Y466rDaI EC issue we found has a bigger impact from what we expected in the beginning https://support.lenovo.com/us/en/product_security/len-27764 … -
Abusing Windows Management Instrumentation (WMI), by
@mattifestation#BHUSA https://www.youtube.com/watch?v=0SjMgnGwpq8 … -
The official Android app of
#BHUSA is a joke. For an event of this size this is not serious@BlackHatEvents. Thanks to the#BlackHat app, an attacker can: - Open a random url in the app browser - Pre dial a number - Create an email - Open Chrome to download a filepic.twitter.com/mZ4UsuilPm -
-
-
Dino's Black Hat keynote will be streamed live on Youtube: https://www.youtube.com/watch?v=v1_mMO30Mxw …
#BHUSAPrikaži ovu nit -
Today we're releasing a report on
#APT41, a prolific Chinese cyber threat group that carries out state-sponsored espionage activity in parallel w/ financially motivated ops. Visit us at#BHUSA to learn more from our#threatintel experts. >> Read more: https://feye.io/33gXbQZ pic.twitter.com/yXpK8ve0xmAPT41: A Dual Espionage and Cyber Crime OperationAPT41 is unique among tracked China-based actors in that it leverages non-public malware typically reserved for espionage campaigns in what appears to be activity for personal gain.Prikaži ovu nit -
This is an absolute "must-see" RT
@CrowdStrikeRcng:
@MarioAndretti learning to DJ at our#BHUSA racing event might be the best thing you'll see this week.@crowdstrike#crowdstrikeracing#everysecondcounts#f1pic.twitter.com/9PWX0kJFjA -
Finally noticed my
@BlackHatEvents#BHUSA talk was posted. Oddly enough, it comes at a time where several people have questioned how I could possibly understand trauma in general, let alone specifically within#infosechttps://youtu.be/jBE52RFld1Y -
Neat, the official
#BHUSA recording of Practical Web Cache Poisoning is now online https://www.youtube.com/watch?v=j2RrmNxJZ5c … -
Progress bar: loading and installing persistent UEFI firmware implant remotely


...
before BitLocker, System Guard, Credential Guard or other SW defenses, before the OS!
Remote UEFI exploit by @jessemichael@HackingThings@ABazhaniuk at#BHUSA Demo https://youtu.be/IqtftpiGuAo pic.twitter.com/Vhg2wntQOh
Prikaži ovu nit -
Below are the PowerUpSQL presentation slides from BlackHat USA Arsenal. The video is a webinar style presentation that introduces the tool and walks through all the demos. Slides: https://bit.ly/2OxbGYy Video/Webinar: https://youtu.be/UX_tBJQtqW0
@BlackHatEvents#bhusa -
"Ginger Rogers did everything Fred Astaire did, except backwards and in high heels." https://youtu.be/py2qmGbyhlw
#BHUSA pic.twitter.com/TBVZtcZUHV
-
Blackhat Conference 2018 Cybersecurity Thought Leadership with
@ThomLangford@Sidragon1@InfoSecRick - Thoughts on#BHUSA#BHUSA2018#security#cybersecurity#infosec#AI#DiversityInTech#blockchainpic.twitter.com/iVKlPidK23 -
Blackhat Conference 2018 Cybersecurity Thought Leadership with
@Bitdefender_Ent#sponsored@joeyfns@JenaPR_exec#cybersecurity#cryptojacking#security#BHUSA#BHUSA2018pic.twitter.com/kXRbjHohja -
Blackhat Conference 2018 Cybersecurity Thought Leadership with
@ATTBusiness Part2#Sponsored#cybersecurity#BHUSA#BHUSA2018#AI#security@BJWebb4@Shirastweet@dez_blanchfield@evankirstel@Kevin_Jacksonpic.twitter.com/3Ybw0O47Aq -
Doors are open at the Mandalay Bay Event Center for
#BHUSA 2018 Keynote by Parisa Tabriz (@laparisa). Breakfast will be served in the Event Center for Briefings Pass holders. Arrive early to grab your seat You can also watch the YouTube Livestream, here:http://ow.ly/XVsQ30ljUHS -
Let the X-Force Red Labs test your devices before — not after — the bad guys do. Discover how: https://ibm.co/2Mn5X78
#BHUSA pic.twitter.com/L5Q0W7Iiqy -
Video of my PoC for CVE-2018-4249 (macOS packet-mangler). I'll be at
#BHUSA 2018 booth IC2434 to talk about this and other vulnerabilities found with#SemmleQL.pic.twitter.com/FGFElyL83LPrikaži ovu nit
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.