Twitter | Search | |
Search Refresh
Ian Coldwater ⎈ Sep 19
Here are the slides from the talk and I presented at Black Hat USA 2019, "The Path Less Traveled: Abusing Kubernetes Defaults", complete with links to recorded demos! Slide link here: Briefings description here:
Reply Retweet Like
gteissier Aug 23
My slides can be downloaded at . To be delivered soon: a small update for the slides, plus a toolkit to play with SIGTRAN components and reproduce some of the attacks described during the talk
Reply Retweet Like
Alex Matrosov Aug 17
I wrote a blog post "Breaking Through Another Side: Bypassing Firmware Security Boundaries". It's a first part of the series based on our research with Alexandre Gazet. HW/FW Security != Summary of all Security Boundaries
Reply Retweet Like
Collin Mulliner Aug 12
Quick roundup for my talk: Come Join the CAFSA - Continuous Automated Firmware Security Analysis Slides: Tool: Blog post: TL;DR: FwAnalyzer is for device builders, made for automation such as CI
Reply Retweet Like
Olivier Bilodeau Sep 6
Spent a lot of time on that release in the last weeks. Now that this is out of the way, Arsenal slides and workshop exercices will be made public next week!
Reply Retweet Like
Cisco Sep 4
Hackers with a moral compass. Hear from long time experts about how they hack with a conscious.
Reply Retweet Like
Marina Simakov Aug 25
If you weren’t in Vegas for and , and I will be presenting the results of our NTLM research in a webinar this Tuesday, everyone is welcome, Q&A at the end included 🙂
Reply Retweet Like
Elliot Alderson Aug 8
The official Android app of is a joke. For an event of this size this is not serious . Thanks to the app, an attacker can: - Open a random url in the app browser - Pre dial a number - Create an email - Open Chrome to download a file
Reply Retweet Like
NSA/CSS Aug 19
We recently sat down to discuss development, creativity, and the moonshot that is .
Reply Retweet Like
Anthony Ernest Sep 19
: Security Lessons from the Front Lines
Reply Retweet Like
Orange Tsai  🍊 Aug 9
Just drop the RCEs, slides( will fix soon) and blog of and me's and talk - Infiltrating Corporate Intranet Like NSA: Pre-auth RCE on Leading SSL VPNs! Please check that and let us know if you have any questions!
Reply Retweet Like
Ian Coldwater ⎈ Aug 23
Should I write a blog post with numbers and stuff about the scholarships? I never write blog posts but that seems like a good one for posterity and/or anyone crazy enough to attempt similar efforts in the future
Reply Retweet Like
Anthony Ernest Sep 19
: Research Finds Electric Motors Vulnerable to Hackers
Reply Retweet Like
Anthony Ernest Sep 19
Don’t Assume that 5G Networks Can’t Get Hacked
Reply Retweet Like
Guillaume Valadon Sep 9
picodma: DMA Attacks at Your Fingerprints
Reply Retweet Like
gteissier Aug 28
The associated toolset, pictured in the slides, has been released on Orange CERT-CC GitHub:
Reply Retweet Like
Yanai Moyal Aug 8
Reply Retweet Like
Alyssa Miller (Speaking @ McAfee MPower) Sep 4
If reading isn't your thing, another option would be to watch videos from conferences like and others that have a variety of talks. Here from experts in the field and see what work they're doing that might be interesting to you.
Reply Retweet Like
Authentic8 Sep 10
Check out these reviews of the 10 top tools presented at for threat intelligence analysts, OSINT researchers, forensic investigators, and threat hunters:
Reply Retweet Like
Anthony Ernest Sep 19
Researchers Find Way to Fool Biometric Authentication
Reply Retweet Like