Eyal Itkin (@eyalitkin) 's Twitter Profile
Eyal Itkin

@eyalitkin

(Former) Vulnerability researcher. Tweets are my own.

ID: 936921400803127297

linkhttps://eyalitkin.wordpress.com calendar_today02-12-2017 11:34:03

859 Tweet

3,3K Takipçi

128 Takip Edilen

quarkslab (@quarkslab) 's Twitter Profile Photo

Is remote code execution in UEFI firmware possible? Yes it is. Meet #PixieFAIL: 9 vulnerabilities in the IPv6 stack of EDK II, the open source UEFI implementation used by billions of computers. Full details by Francisco Falcon and iarce in our new blog post: blog.quarkslab.com/pixiefail-nine…

Is remote code execution in UEFI firmware possible?
Yes it is. 
Meet #PixieFAIL: 9 vulnerabilities in the IPv6 stack of EDK II, the open source UEFI implementation used by billions of computers.
Full details by <a href="/fdfalcon/">Francisco Falcon</a> and <a href="/4Dgifts/">iarce</a> in our new blog post:
blog.quarkslab.com/pixiefail-nine…
Check Point Research (@_cpresearch_) 's Twitter Profile Photo

Today, we're disclosing an overlooked, wide-impact bug/attack vector affecting the Windows/COM ecosystem, dubbed #MonikerLink. In Outlook, the bug's impact is far and wide: from leaking NTLM creds to RCE. The same issue may exist in other software, too. research.checkpoint.com/2024/the-risks…

badidea 🪐 (@0xabad1dea) 's Twitter Profile Photo

🚨 breaking radio silence to deliver a critical warning: the xz upstream tarballs have been backdoored for one month. This is a five alarm fire for everyone who uses Linux. openwall.com/lists/oss-secu… boehs.org/node/everythin…

HaxRob (@haxrob) 's Twitter Profile Photo

Andres Freund, the principal software engineer at Microsoft who discovered the xz backdoor really does deserve a big pat on the back. 👏 The outcome could have been much, much worse.

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🛑 URGENT SECURITY ALERT! Secret backdoor found in XZ Utils compression library used by major #Linux distros, like Fedora, Kali Linux, and openSUSE. Attackers could breach SSH and take control of systems. thehackernews.com/2024/03/urgent… Update and review your systems immediately.

vx-underground (@vxunderground) 's Twitter Profile Photo

The xz situation is absolutely insane and almost certainly state sponsored. This is an excellent example of a widely used software being maintained by basically one person. Read this web article and then frown and become sad. boehs.org/node/everythin…

Anthony Weems (@amlweems) 's Twitter Profile Photo

I've been reverse engineering the xz backdoor this weekend and have documented the payload format and written a proof-of-concept exploit for the RCE. The payloads are signed with an ED448 key, so I patched my own key into the backdoor for testing. :-) github.com/amlweems/xzbot

I've been reverse engineering the xz backdoor this weekend and have documented the payload format and written a proof-of-concept exploit for the RCE. The payloads are signed with an ED448 key, so I patched my own key into the backdoor for testing. :-)

github.com/amlweems/xzbot
Oligo Security (@oligosecurity) 's Twitter Profile Photo

🚨 #OligoADR's tech was ready to detect CVE-2024-3094 #XZ exploitation attempts from day one. This early detection, detailed in our recent blog, showcases our advanced, library-level profiling in action—no additional rules required. Learn how: oligo.security/blog/detecting…

BlueHat IL (@bluehatil) 's Twitter Profile Photo

The remarkable Ivan Kwiatkowski guided us through a deep dive into the intricate relationships between commercial cyber actors and governmental agendas, revealed thanks to the massive I-Soon leak.

The remarkable Ivan Kwiatkowski guided us through a deep dive into the intricate relationships between commercial cyber actors and governmental agendas, revealed thanks to the massive I-Soon leak.
BlueHat IL (@bluehatil) 's Twitter Profile Photo

Who were the Iranian cyber groups attempting to disrupt the municipal elections in Israel? What were their tools and techniques, and how is Albania connected to the whole story? Israel Gubi & Amitai Ben Shushan Ehrlich held all the answers in their captivating talk.

Who were the Iranian cyber groups attempting to disrupt the municipal elections in Israel? What were their tools and techniques, and how is Albania connected to the whole story? Israel Gubi &amp; Amitai Ben Shushan Ehrlich held all the answers in their captivating talk.
sagitz (@sagitz_) 's Twitter Profile Photo

We discovered that by uploading a malicious AI model to @Replicate, a leading AI-as-a-Service platform, we could read and modify prompts of other customers 🤯 Here is exactly how we did it 🧵⬇️

We discovered that by uploading a malicious AI model to @Replicate, a leading AI-as-a-Service platform, we could read and modify prompts of other customers 🤯

Here is exactly how we did it 🧵⬇️