Fabio Pagani Profile
Fabio Pagani

@pagabuc

Followers
905
Following
3K
Media
9
Statuses
1K

Vulnerability Research Lead @binarly_io. Prev: Postdoc @ucsantabarbara. Binary analysis, memory forensics et al. Captures flags with Shellphish and NOPS.

Italy
Joined June 2011
Don't wanna be here? Send us removal request.
@pagabuc
Fabio Pagani
19 hours
RT @binarly_io: Nvidia OSR (@AlexTereshkin, @Adam_pi3) reveals high-impact Supermicro BMC vulnerabilities (CVE-2024-10237/38/39). Binarly R….
0
18
0
@pagabuc
Fabio Pagani
1 day
Arbitrary write in SMM, silently patched in 2018 (!!) but still present in current firmware. Automatically discovered by @binarly_io DVA technology👇.
@binarly_io
BINARLY🔬
2 days
🚨𝗡𝗲𝘄 𝗛𝗶𝗴𝗵-𝗦𝗲𝘃𝗲𝗿𝗶𝘁𝘆 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝘆 𝗶𝗻 𝗔𝗠𝗜-𝗕𝗮𝘀𝗲𝗱 𝗗𝗲𝘃𝗶𝗰𝗲𝘀.Our Deep Vulnerability Analysis (DVA) technology has automatically uncovered a high-impact vulnerability (CVE-2025-33043) in the AMI MicrocodeUpdate module that's impacting the
0
3
15
@pagabuc
Fabio Pagani
1 day
RT @matrosov: 🚨Yesterday marked a notable moment as CISA added, for the first time, an AMI MegaRAC BMC vulnerability (CVE-2024-54085) to it….
0
26
0
@pagabuc
Fabio Pagani
2 days
RT @binarly_io: 🚨𝗡𝗲𝘄 𝗛𝗶𝗴𝗵-𝗦𝗲𝘃𝗲𝗿𝗶𝘁𝘆 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝘆 𝗶𝗻 𝗔𝗠𝗜-𝗕𝗮𝘀𝗲𝗱 𝗗𝗲𝘃𝗶𝗰𝗲𝘀.Our Deep Vulnerability Analysis (DVA) technology has automatically un….
0
18
0
@pagabuc
Fabio Pagani
4 days
RT @NikolajSchlej: Got an Acer SFG16-71-549T to be used a DUT for further research into Insyde H2O firmware platform:.- FlashDeviceMap hash….
0
4
0
@pagabuc
Fabio Pagani
12 days
RT @exploitsclub: Another Week, Another EXPLOITS CLUB 📰. ---.🎉 Binja giveaway: sign up to support the newsletter 🎉.---. Tesla wall charger….
0
12
0
@pagabuc
Fabio Pagani
13 days
RT @binarly_io: ⛓️💥Our latest CVE-2025-3052 discovery started with a strange UEFI module on VT. Signed in 2022, uploaded in 2024, trusted….
0
17
0
@pagabuc
Fabio Pagani
13 days
RT @NikolajSchlej: Published the third part of my blog series about Hydroph0bia (CVE-2025-4275) vulnerability, this one is about the fix as….
0
33
0
@pagabuc
Fabio Pagani
15 days
RT @binarly_io: @NikolajSchlej What’s alarming is how many devices are still vulnerable in-the-wild. Binarly telemetry data reveals the….
0
6
0
@pagabuc
Fabio Pagani
16 days
RT @binarly_io: 🔎From Hidden Semantics to Structured Insights✨. By combining static analysis techniques and tailored heuristic improvements….
0
15
0
@pagabuc
Fabio Pagani
16 days
RT @binarly_io: ⛓️We recently investigated the newly disclosed Hydroph0bia vulnerability (CVE-2025-4275 discovered by @NikolajSchlej) to pr….
0
7
0
@pagabuc
Fabio Pagani
23 days
RT @NikolajSchlej: It is extremely funny to me that Binarly and I managed to uncover two separate SecureBoot bypasses that together cover e….
0
5
0
@pagabuc
Fabio Pagani
23 days
Our research on Secure Boot keeps on giving!. Today we disclose CVE-2025-3052, a Secure Boot bypass that started with vulnerable signed module found on VirusTotal and ended with 14 hashes added to dbx by Microsoft in today’s Patch Tuesday 🔥.
@binarly_io
BINARLY🔬
23 days
🚨Binarly is documenting the discovery of CVE-2025-3052, a memory-corruption flaw in a Microsoft-signed UEFI module that lets attackers bypass Secure Boot and run unsigned code before the OS starts. 🔗 Full details: 🛡️ Advisory:
Tweet media one
1
10
33
@pagabuc
Fabio Pagani
23 days
RT @NikolajSchlej: The embargo (12:00 UTC 2025-06-10) is over, let's start a thread on Hydroph0bia (CVE-2025-4275), a trivial SecureBoot an….
0
92
0
@pagabuc
Fabio Pagani
29 days
RT @binarly_io: Binarly REsearch is proud to build & support two @HexRaysSA IDA plugin contest winners:. 🔬 efiXplorer by @yeggorv . https://….
0
12
0
@pagabuc
Fabio Pagani
1 month
RT @binarly_io: Why do attackers love bootkits? 🔗Persistence + ♻️stealth. At the @REverseConf, Binarly REsearcher @cci_forensics shows how….
0
11
0
@pagabuc
Fabio Pagani
1 month
RT @Zardus: In case you haven't heard, we (read: @mahal0z, @AtipriyaBajaj, and the rest of the program committee) are starting a workshop a….
0
4
0
@pagabuc
Fabio Pagani
1 month
RT @xorpse: We're are happy to announce a new release of our #Rust bindings for @HexRaysSA idalib. What's new:.- New APIs for working with….
0
21
0
@pagabuc
Fabio Pagani
1 month
RT @REverseConf: The RE//verse YouTube channel is packed with talks from RE//verse 2025! Catch Takahiro’s deep dive into UEFI Bootkit Hunti….
0
32
0
@pagabuc
Fabio Pagani
2 months
RT @matrosov: ⛓️‍💥The Secure Boot Forbidden Signature Database (DBX) is meant to block known malicious or vulnerable UEFI components (like….
0
8
0