|
Peleg Hadar
@
peleghd
|
|
Security Researcher at @SafeBreach. I have a passion for various InfoSec topics such as Offensive Security, Windows Internals, RE, Low-Level and Vuln Research
|
|
|
174
Tweetovi
|
827
Pratim
|
471
Osobe koje vas prate
|
| Tweetovi |
|
Peleg Hadar
@peleghd
|
9 h |
|
Correct. VS2017 is no longer loads the DLL as an executable, it treats it as a data-only file.
|
||
|
|
||
|
Peleg Hadar
@peleghd
|
22 h |
|
CVE-2019-19705 - A vulnerability which I found in Realtek's Driver package for Windows, which affects a lot of PC users:
safebreach.com/Post/Realtek-H…
|
||
|
|
||
| Peleg Hadar proslijedio/la je tweet | ||
|
Jon Oberheide
@jonoberheide
|
4. velj |
|
Whoa, what? @googlephotos? pic.twitter.com/2cZsABz1xb
|
||
|
|
||
|
Peleg Hadar
@peleghd
|
3. velj |
|
techradar.com/news/staying-o…
I interviewed for TechRadar Pro about the vulnerabilities I found during 2019 as part of my job in @safebreach Labs.
|
||
|
|
||
|
Peleg Hadar
@peleghd
|
1. velj |
|
If you want to start a research on one of Apple's mechanisms which are related to the Continuity protocol - this repo looks like a great reference to start with. twitter.com/trufae/status/…
|
||
|
|
||
|
Peleg Hadar
@peleghd
|
1. velj |
|
@ronenshh AWESOME JOB 👑
|
||
|
|
||
|
Peleg Hadar
@peleghd
|
31. sij |
|
|
||
| Peleg Hadar proslijedio/la je tweet | ||
|
PJC
@pjcampbe11
|
29. sij |
|
|
||
|
|
||
|
Peleg Hadar
@peleghd
|
21. sij |
|
A great novel research by Amit Klein - @safebreach Labs:
safebreach.com/Post/EFS-Ranso…
|
||
|
|
||
| Peleg Hadar proslijedio/la je tweet | ||
|
BlueHat IL
@BlueHatIL
|
20. sij |
|
The wait is finally over! Registration & schedule for #BlueHatIL 2020 are live. Places are limited so register NOW: bluehatil.com pic.twitter.com/JXXx8OQOYn
|
||
|
|
||
| Peleg Hadar proslijedio/la je tweet | ||
|
SafeBreach
@safebreach
|
17. sij |
|
SafeBreach Labs is the 1st BAS solutions to deliver simulations for endpoint and network coverage. #cybersecurity #infosec ow.ly/9CVA50xYDzX
|
||
|
|
||
| Peleg Hadar proslijedio/la je tweet | ||
|
🥝 Benjamin Delpy
@gentilkiwi
|
17. sij |
|
#cve20200601 #curveball last use case for today
Yes, it's also dangerous for Microsoft VBA macro (especially when you think "Disable all Macros except digitally signed" will protect you) pic.twitter.com/bHGQ8ZEMs7
|
||
|
|
||
| Peleg Hadar proslijedio/la je tweet | ||
|
Tal Be'ery
@TalBeerySec
|
17. sij |
|
1/ Insights from analyzing Chrome's patch for #curveball #cve20200601 to protect Chrome's users on vulnerable unpatched #Win10 machines
chromium-review.googlesource.com/c/chromium/src…
|
||
|
|
||
|
Peleg Hadar
@peleghd
|
17. sij |
|
"The ECC discrete log parameter P-256... [SNIP] ... is suspected of having an NSA backdoor in its unexplained constants"
#CVE-2020-0601 #Curveball twitter.com/spovolny/statu…
|
||
|
|
||
|
Peleg Hadar
@peleghd
|
16. sij |
|
If you own a Windows 10 box - don’t wait, update it now. twitter.com/ollypwn/status…
|
||
|
|
||
| Peleg Hadar proslijedio/la je tweet | ||
|
Yarden Shafir
@yarden_shafir
|
16. sij |
|
After a lot of work and some crypto-related delays, I couldn't be more proud to publish @aionescu's and mine latest research - The complete overview of CET internals on Windows (so far!):
windows-internals.com/cet-on-windows/
|
||
|
|
||
|
Peleg Hadar
@peleghd
|
15. sij |
|
This is the patched one (10.0.18362.592): 7a9dd389b0e3c124d4bfe5c1ff15f9a93285514f
|
||
|
|
||
| Peleg Hadar proslijedio/la je tweet | ||
|
i24NEWS English
@i24NEWS_EN
|
14. sij |
|
The United States says #Iran plans to launch multiple cyber attacks in retaliation for the killing of Qasem #Soleimani. Israeli #cybersecurity company, @safebreach, tells i24NEWS' Ariel Levin-Waldman how one can identity, and combat Iranian 'threat groups' : pic.twitter.com/oOthBIPGSX
|
||
|
|
||
| Peleg Hadar proslijedio/la je tweet | ||
|
Ralf (RPW)
@esizkur
|
14. sij |
|
OK, this explains the call to ChainComparePublicKeyParametersAndBytes() in ChainGetSubjectStatus(): pic.twitter.com/73kigQtgw9
|
||
|
|
||
| Peleg Hadar proslijedio/la je tweet | ||
|
Blue Frost Security
@bluefrostsec
|
7. sij |
|
Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher @flxflndy labs.bluefrostsecurity.de/blog/2020/01/0…
|
||
|
|
||