Luca Bongiorni (@cyberantani) 's Twitter Profile
Luca Bongiorni

@cyberantani

Need a seasoned ๐Ÿ‡ฎ๐Ÿ‡น#Hacker to setup a #CyberLab or #HackersDreamTeam for conducting Applied Security R&D or ProdSec activitiesโ“๐Ÿ˜Ž๐Ÿ‘‰Also on BSKY๐Ÿ‘ˆ๐Ÿ˜Ž

ID: 495744568

linkhttp://cyberantani.bsky.social calendar_today18-02-2012 08:26:11

11,11K Tweet

6,6K Takipรงi

2 Takip Edilen

Luca Bongiorni (@cyberantani) 's Twitter Profile Photo

๐‘น๐’†๐’Ž๐’๐’•๐’† ๐‘ฌ๐’™๐’‘๐’๐’๐’Š๐’•๐’‚๐’•๐’Š๐’๐’ ๐’๐’‡ ๐‘ต๐’Š๐’”๐’”๐’‚๐’ ๐‘ณ๐’†๐’‚๐’‡: ๐‘ช๐’๐’๐’•๐’“๐’๐’๐’๐’Š๐’๐’ˆ ๐‘ช๐’“๐’Š๐’•๐’Š๐’„๐’‚๐’ ๐‘ฉ๐’๐’…๐’š ๐‘ฌ๐’๐’†๐’Ž๐’†๐’๐’•๐’” ๐’‡๐’“๐’๐’Ž ๐’•๐’‰๐’† ๐‘ฐ๐’๐’•๐’†๐’“๐’๐’†๐’• ๐Ÿš— Electric cars arenโ€™t silent to hackers! At Black Hat Asia 2025 the PCA Cyber Security crew showed how 30

๐‘น๐’†๐’Ž๐’๐’•๐’† ๐‘ฌ๐’™๐’‘๐’๐’๐’Š๐’•๐’‚๐’•๐’Š๐’๐’ ๐’๐’‡ ๐‘ต๐’Š๐’”๐’”๐’‚๐’ ๐‘ณ๐’†๐’‚๐’‡: ๐‘ช๐’๐’๐’•๐’“๐’๐’๐’๐’Š๐’๐’ˆ ๐‘ช๐’“๐’Š๐’•๐’Š๐’„๐’‚๐’ ๐‘ฉ๐’๐’…๐’š ๐‘ฌ๐’๐’†๐’Ž๐’†๐’๐’•๐’” ๐’‡๐’“๐’๐’Ž ๐’•๐’‰๐’† ๐‘ฐ๐’๐’•๐’†๐’“๐’๐’†๐’•

๐Ÿš— Electric cars arenโ€™t silent to hackers!
At Black Hat Asia 2025 the PCA Cyber Security crew showed how 30
Luca Bongiorni (@cyberantani) 's Twitter Profile Photo

๐‘ธ๐’–๐’Š๐’„๐’Œ๐‘บ๐’‰๐’†๐’๐’: ๐‘บ๐’‰๐’‚๐’“๐’Š๐’๐’ˆ ๐’Š๐’” ๐‘ช๐’‚๐’“๐’Š๐’๐’ˆ ๐’‚๐’ƒ๐’๐’–๐’• ๐’‚๐’ ๐‘น๐‘ช๐‘ฌ ๐‘จ๐’•๐’•๐’‚๐’„๐’Œ ๐‘ช๐’‰๐’‚๐’Š๐’ ๐’๐’ ๐‘ธ๐’–๐’Š๐’„๐’Œ ๐‘บ๐’‰๐’‚๐’“๐’† ๐Ÿš€ 10 logic-flaws โ†’ 1 click RCE! SafeBreach researchers dug into Googleโ€™s new Quick Share file-transfer and found 10 vulnerabilities โ€“ from silent

๐‘ธ๐’–๐’Š๐’„๐’Œ๐‘บ๐’‰๐’†๐’๐’: ๐‘บ๐’‰๐’‚๐’“๐’Š๐’๐’ˆ ๐’Š๐’” ๐‘ช๐’‚๐’“๐’Š๐’๐’ˆ ๐’‚๐’ƒ๐’๐’–๐’• ๐’‚๐’ ๐‘น๐‘ช๐‘ฌ ๐‘จ๐’•๐’•๐’‚๐’„๐’Œ ๐‘ช๐’‰๐’‚๐’Š๐’ ๐’๐’ ๐‘ธ๐’–๐’Š๐’„๐’Œ ๐‘บ๐’‰๐’‚๐’“๐’†

๐Ÿš€ 10 logic-flaws โ†’ 1 click RCE!

SafeBreach researchers dug into Googleโ€™s new Quick Share file-transfer and found 10 vulnerabilities โ€“ from silent
Luca Bongiorni (@cyberantani) 's Twitter Profile Photo

๐‘พ๐’‰๐’†๐’“๐’†๐’—๐’†๐’“ ๐‘ฐ ๐‘ด๐’‚๐’š ๐‘น๐’๐’‚๐’Ž: ๐‘บ๐’•๐’†๐’‚๐’๐’•๐’‰๐’š ๐‘ฐ๐’๐’•๐’†๐’“๐’„๐’†๐’‘๐’•๐’Š๐’๐’ ๐’‚๐’๐’… ๐‘ฐ๐’๐’‹๐’†๐’„๐’•๐’Š๐’๐’ ๐‘จ๐’•๐’•๐’‚๐’„๐’Œ๐’” ๐’•๐’‰๐’“๐’๐’–๐’ˆ๐’‰ ๐‘น๐’๐’‚๐’Ž๐’Š๐’๐’ˆ ๐‘จ๐’ˆ๐’“๐’†๐’†๐’Ž๐’†๐’๐’•๐’” ๐Ÿ“ก What if a rogue base station could impersonate your trusted mobile networkโ€”even while roamingโ€”and youโ€™d

๐‘พ๐’‰๐’†๐’“๐’†๐’—๐’†๐’“ ๐‘ฐ ๐‘ด๐’‚๐’š ๐‘น๐’๐’‚๐’Ž: ๐‘บ๐’•๐’†๐’‚๐’๐’•๐’‰๐’š ๐‘ฐ๐’๐’•๐’†๐’“๐’„๐’†๐’‘๐’•๐’Š๐’๐’ ๐’‚๐’๐’… ๐‘ฐ๐’๐’‹๐’†๐’„๐’•๐’Š๐’๐’ ๐‘จ๐’•๐’•๐’‚๐’„๐’Œ๐’” ๐’•๐’‰๐’“๐’๐’–๐’ˆ๐’‰ ๐‘น๐’๐’‚๐’Ž๐’Š๐’๐’ˆ ๐‘จ๐’ˆ๐’“๐’†๐’†๐’Ž๐’†๐’๐’•๐’”

๐Ÿ“ก What if a rogue base station could impersonate your trusted mobile networkโ€”even while roamingโ€”and youโ€™d
Luca Bongiorni (@cyberantani) 's Twitter Profile Photo

๐‘ด๐’Š๐’”๐’‚๐’…๐’—๐’†๐’๐’•๐’–๐’“๐’†๐’” ๐’˜๐’Š๐’•๐’‰ ๐‘ช๐’๐’‘๐’Š๐’๐’๐’•+: ๐‘จ๐’•๐’•๐’‚๐’„๐’Œ๐’Š๐’๐’ˆ ๐’‚๐’๐’… ๐‘ฌ๐’™๐’‘๐’๐’๐’Š๐’•๐’Š๐’๐’ˆ ๐‘พ๐’Š๐’๐’…๐’๐’˜๐’” ๐‘ต๐‘ท๐‘ผ ๐‘ซ๐’“๐’Š๐’—๐’†๐’“๐’” ๐Ÿง ๐Ÿค– AI PCs = New Attack Surface โ€“ Copilot-ready laptops ship with dedicated NPUs and an all-new MCDM driver stack. Nicola Stauffer & Gรผrkan

๐‘ด๐’Š๐’”๐’‚๐’…๐’—๐’†๐’๐’•๐’–๐’“๐’†๐’” ๐’˜๐’Š๐’•๐’‰ ๐‘ช๐’๐’‘๐’Š๐’๐’๐’•+: ๐‘จ๐’•๐’•๐’‚๐’„๐’Œ๐’Š๐’๐’ˆ ๐’‚๐’๐’… ๐‘ฌ๐’™๐’‘๐’๐’๐’Š๐’•๐’Š๐’๐’ˆ ๐‘พ๐’Š๐’๐’…๐’๐’˜๐’” ๐‘ต๐‘ท๐‘ผ ๐‘ซ๐’“๐’Š๐’—๐’†๐’“๐’”

๐Ÿง ๐Ÿค– AI PCs = New Attack Surface โ€“ Copilot-ready laptops ship with dedicated NPUs and an all-new MCDM driver stack. Nicola Stauffer & Gรผrkan
Luca Bongiorni (@cyberantani) 's Twitter Profile Photo

๐‘ณ๐‘ณ๐‘ด4๐‘บ๐’‰๐’†๐’๐’: ๐‘ซ๐’Š๐’”๐’„๐’๐’—๐’†๐’“๐’Š๐’๐’ˆ ๐’‚๐’๐’… ๐‘ฌ๐’™๐’‘๐’๐’๐’Š๐’•๐’Š๐’๐’ˆ ๐‘น๐‘ช๐‘ฌ ๐‘ฝ๐’–๐’๐’๐’†๐’“๐’‚๐’ƒ๐’Š๐’๐’Š๐’•๐’Š๐’†๐’” ๐’Š๐’ ๐‘น๐’†๐’‚๐’-๐‘พ๐’๐’“๐’๐’… ๐‘ณ๐‘ณ๐‘ด-๐‘ฐ๐’๐’•๐’†๐’ˆ๐’“๐’‚๐’•๐’†๐’… ๐‘ญ๐’“๐’‚๐’Ž๐’†๐’˜๐’๐’“๐’Œ๐’” ๐’‚๐’๐’… ๐‘จ๐’‘๐’‘๐’” ๐Ÿค– Prompt injection โžก๏ธ Remote Code Execution?! Tong Liu & Yuekang Li show that

๐‘ณ๐‘ณ๐‘ด4๐‘บ๐’‰๐’†๐’๐’: ๐‘ซ๐’Š๐’”๐’„๐’๐’—๐’†๐’“๐’Š๐’๐’ˆ ๐’‚๐’๐’… ๐‘ฌ๐’™๐’‘๐’๐’๐’Š๐’•๐’Š๐’๐’ˆ ๐‘น๐‘ช๐‘ฌ ๐‘ฝ๐’–๐’๐’๐’†๐’“๐’‚๐’ƒ๐’Š๐’๐’Š๐’•๐’Š๐’†๐’” ๐’Š๐’ ๐‘น๐’†๐’‚๐’-๐‘พ๐’๐’“๐’๐’… ๐‘ณ๐‘ณ๐‘ด-๐‘ฐ๐’๐’•๐’†๐’ˆ๐’“๐’‚๐’•๐’†๐’… ๐‘ญ๐’“๐’‚๐’Ž๐’†๐’˜๐’๐’“๐’Œ๐’” ๐’‚๐’๐’… ๐‘จ๐’‘๐’‘๐’”

๐Ÿค– Prompt injection โžก๏ธ Remote Code Execution?!
Tong Liu & Yuekang Li show that
Luca Bongiorni (@cyberantani) 's Twitter Profile Photo

A Hacking Story in 3 acts... โœ… Find a new target โœ… Get a sample โœ… Hack it with #WHIDBOARD P.S. What is WHIDBOARD? ๐Ÿ‘‡ Come at BlackHat Arsenal Lab in Las Vegas and you'll see!๐Ÿ‘€๐Ÿ”Ž๐Ÿดโ€โ˜  blackhat.com/us-25/arsenal/โ€ฆ

A Hacking Story in 3 acts...
โœ… Find a new target
โœ… Get a sample
โœ… Hack it with #WHIDBOARD 
P.S. What is WHIDBOARD? ๐Ÿ‘‡
Come at BlackHat  Arsenal Lab in Las Vegas and you'll see!๐Ÿ‘€๐Ÿ”Ž๐Ÿดโ€โ˜ 
blackhat.com/us-25/arsenal/โ€ฆ
Luca Bongiorni (@cyberantani) 's Twitter Profile Photo

The best part? โœ… Telnet enabled w/o root password ๐Ÿ’ฅ โœ… Bunch of them exposed on Internet ๐Ÿ™‰๐Ÿ™ˆ๐Ÿ™Š๐Ÿ‘€๐Ÿดโ€โ˜ 

The best part?
โœ… Telnet enabled w/o root password ๐Ÿ’ฅ
โœ… Bunch of them exposed on Internet ๐Ÿ™‰๐Ÿ™ˆ๐Ÿ™Š๐Ÿ‘€๐Ÿดโ€โ˜ 
Luca Bongiorni (@cyberantani) 's Twitter Profile Photo

๐‘บ๐’•๐’†๐’‚๐’๐’•๐’๐’๐’•๐’‰: ๐‘ฉ๐’“๐’†๐’‚๐’Œ๐’Š๐’๐’ˆ ๐‘ฉ๐’๐’–๐’†๐’•๐’๐’๐’•๐’‰ ๐‘บ๐’†๐’„๐’–๐’“๐’Š๐’•๐’š ๐‘จ๐’ƒ๐’–๐’”๐’Š๐’๐’ˆ ๐‘บ๐’Š๐’๐’†๐’๐’• ๐‘จ๐’–๐’•๐’๐’Ž๐’‚๐’•๐’Š๐’„ ๐‘ท๐’‚๐’Š๐’“๐’Š๐’๐’ˆ ๐Ÿ”Š Silent takeover alert! - Stealtooth shows how an attacker can overwrite a deviceโ€™s Bluetooth link-key without any pop-ups or PIN

๐‘บ๐’•๐’†๐’‚๐’๐’•๐’๐’๐’•๐’‰:  ๐‘ฉ๐’“๐’†๐’‚๐’Œ๐’Š๐’๐’ˆ ๐‘ฉ๐’๐’–๐’†๐’•๐’๐’๐’•๐’‰ ๐‘บ๐’†๐’„๐’–๐’“๐’Š๐’•๐’š ๐‘จ๐’ƒ๐’–๐’”๐’Š๐’๐’ˆ  ๐‘บ๐’Š๐’๐’†๐’๐’• ๐‘จ๐’–๐’•๐’๐’Ž๐’‚๐’•๐’Š๐’„ ๐‘ท๐’‚๐’Š๐’“๐’Š๐’๐’ˆ

๐Ÿ”Š  Silent takeover alert! - Stealtooth shows how an attacker can overwrite  a deviceโ€™s Bluetooth link-key without any pop-ups or PIN