Twitter | Pretraživanje | |
Alex Bazhaniuk
Founder and CTO at
6.320
Tweetovi
1.534
Pratim
3.901
Osobe koje vas prate
Tweetovi
Alex Bazhaniuk proslijedio/la je tweet
ringzerø.training 22. sij
Learn the fundamentals of firmware attacks via . Then master firmware exploitation with , , and at . 🔥
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Eclypsium 31. sij
The January Eclypsium Firmware Threat Report is now out. Take a look at it here:
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Yuriy Bulygin 31. sij
Come work with an awesome research team on firmware and hardware threats!
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Rick Altherr 30. sij
Our research team is growing. If you're interested in developing detection methods for PC firmware threats and vulnerabilities, send your resume/CV to careers@eclypsium.com. Portland, USA or Córdoba, Argentina preferred. DMs open for questions.
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Rick Altherr 28. sij
Odgovor korisniku/ci @kc8apf
I'll be giving trainings similar to what Richard attended at both CanSecWest () and Ringzer0 () this year. If you're unsure it will be useful for you, get in touch and I'll gladly answer questions.
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Eclypsium 30. sij
Eclypsium published new research exposing vulnerabilities to DMA attacks in laptops from HP and Dell. Our principal researchers, and show that high speed DMA attacks can bypass hardware protections on enterprise devices.
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Eclypsium 30. sij
What happened when & looked at HP & Dell laptops for DMA vulnerabilities? They found some. Join them for a Q&A on Feb. 5 to hear more and ask questions. Register here: . ,
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Eclypsium 30. sij
Join Eclypsium's principal researchers & for a Q&A on their new research on DMA attacks on Feb. 5. To register go to: . , , .
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Yuriy Bulygin 30. sij
Odgovor korisniku/ci @c7zero
Been also great working with HP and Dell teams on this complex industry problem. Happy to see firmware updates were released promptly
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Yuriy Bulygin 30. sij
Our new research demonstrates that DMA attacks can compromise firmware (and OS) on enterprise laptops with hardware root of trust capabilities among the best in the industry. Very proud to work with the team here at
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
John Loucaides 25. sij
Great summary of risks and mitigations related to cloud. Easy to see how firmware/hardware fit into this given cloudborne (targeting multi-tenancy), bmc vulns (in supply chain), and myriad of recent hw issues (often config or firmware patch related).
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Mark Ermolov 22. sij
We've found a bug in CSME on-die ROM!💥 Intel says it's already targeted by CVE-2019-0090 (). Security Fuses can be extracted! 🔥 Mehlow and Cannon Point chipsets are affected. Stay tuned!
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
offensivecon 21. sij
Untrusted Roots: exploiting vulnerabilities in Intel ACMs by
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Oxide Computer Company 13. sij
🚨 New On the Metal episode w/ 🚨 Join us as we discuss impossible bugs, fires in the data center, reverse engineering BMC firmware, BMC vulnerabilities, Cray computers, and Windows NT on MIPS. Yup you heard that right!
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Eclypsium 21. sij
Since 2016, vulnerabilities have grown a staggering 750%. Read our new article here:
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Mark Ermolov 20. sij
Intel Cannon Point chipset (300 series) as well as Apollo Lake and Gemini Lake SoCs have very dangerous Delayed Authentication Mode (DAM) vulnerability allowing arbitrary code execution and the root key prediction. Detailed write-up is coming. Stay tuned.
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Eclypsium 14. sij
Eclypsium’s researchers and are providing a two day hands-on course in building and using UEFI implants as part of the 2020: Security Masters Dojo. For information/register:
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Eclypsium 14. sij
Listen to On the Metal podcast starring Eclypsium's . Rick discusses as the latest attack vector, impossible bugs and the impact these attacks have on organizations. Listen here:
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Eclypsium 14. sij
Join Eclypsium’s top researchers for firmware security courses at 2020. For more information/register: Mar 14-15 Practical Firmware Implants- and Mar 16-17 Finding Firmware Implants-
Reply Retweet Označi sa "sviđa mi se"
Alex Bazhaniuk proslijedio/la je tweet
Eclypsium 6. sij
Still catching up on your post-holiday security reading? Get Eclypsium's December Threat Report with the latest research and news on security.
Reply Retweet Označi sa "sviđa mi se"