Pascal Gujer
@pascal_gujer
Followers
1K
Following
3K
Media
528
Statuses
3K
security researcher | speaker | trainer | lockpicking | evil maid attacks | maker | https://t.co/kkOosn7aaR | https://t.co/RqmtvBUNxN
127.0.0.1
Joined April 2013
🧠 BREAKING BITLOCKER — Early Bird ends Nov 3! 🔥 Our seasoned Black Hat training (3 years at BHUSA) returns to the classroom in Zurich — battle-tested in countless LEA cases. Learn real BitLocker bypasses hands-on: TPM sniffing • DMA attacks • bootloader patching. Practice
3
0
4
When law enforcement has spare time to make a highlight reel, you know the operation went really well. 😂😂😂 Great to see cybercrime being hit where it hurts.
Europol supports Germany and Switzerland in taking down 'Cryptomixer', seizing EUR 25 million in Bitcoin. This illicit mixing service facilitated money laundering of proceeds from a variety of criminal activities. Details ➡️ https://t.co/d3oTlbrDzd
0
0
2
Europol supports Germany and Switzerland in taking down 'Cryptomixer', seizing EUR 25 million in Bitcoin. This illicit mixing service facilitated money laundering of proceeds from a variety of criminal activities. Details ➡️ https://t.co/d3oTlbrDzd
118
144
436
I have very big concerns why just WA is being protected? What about Signal (same protocol)? Looks to me a bit like the gov says: Don‘t touch WA - we already got other access there and dont want people to not use WA anymore bc of NSO… 🤨
CRUSHING BLOW TO NSO: 🇺🇸Court permanently bans Pegasus spyware-maker from targeting @WhatsApp. 🚫Must destroy tools exploiting WhatsApp 🚫Stop future development of WA targeting Foreign gov customers exempt from data deletion but... 🚫NSO is barred from helping them hack WA. 1/
0
0
2
🚀 We just launched our YouTube channel. First up: a 60-second teaser showing how TPM sniffing breaks BitLocker — one of three real attacks we teach in our Breaking BitLocker training. More hardware security content coming soon. Subscribe & stay tuned 👇 🎥
youtube.com
Hands-On Security delivers practical cybersecurity training with a focus on hardware, firmware, and physical access attacks. Our flagship course “Breaking BitLocker” teaches real-world techniques...
2
0
2
Ich frage mich wie lange @Swisscom , @sunrise und @Salt hier wegschauen und behaupten, dass striktes unterbinden von CallerID Spoofing zu Problemen mit im Homeoffice Arbeitenden führt: Diese könnten dann nicht mehr mit der Geschäftstelefonnummer raustelefonieren… #bullshit
Europol is calling for a coordinated European response to tackle caller ID spoofing — a growing tool for online fraud and social engineering scams. Worldwide, it causes an estimated €850 million in losses each year. Read more in our press release: https://t.co/197rlrPbSW
0
0
0
Psst — kit details: Every participant receives the full hardware kit used in training plus the prepared test device to continue practice after the course. No need to source gear — keep everything and replicate the lab at home or at work. Questions about the kit? Ask below or DM
0
0
0
“Putting all eggs in one basket and all baskets on the Titanic.” — @stefan_frei 🧺🚢 When @awscloud goes down and takes half the internet with it, maybe it’s time to rethink our basket strategy. Reuters report: https://t.co/RAlBT2zRe7 AWS status page: https://t.co/ikjFlDqwQr
0
1
2
Join us today for the October Security Meetup in Zurich Schiffbau - or next week in Bern, Basel, Lucerne & Lausanne👍 Relaxed discussions with likeminded people🤓 https://t.co/f1kIitR5Gf
0
1
5
✈️ Flight delay hack: Instead of doomscrolling, I asked ChatGPT to turn all my past chats into a todo list of unfinished projects to actually get s*** done while waiting... Got clarity, not clutter. 👉 Stop wasting wasted time. Try it: “Go through our past chats and create a todo
0
0
1
@IceSolst It's poisonous. I have colleagues who reside in Israel who I deeply respect. Likewise, I have colleagues who reside outside of Israel, but live in 'Middle-Eastern' countries, who I deeply respect. Inevitably, regardless of any shred of objectivity brought to the metaphorical
63
49
1K
📞 “Let’s go big first — let’s call the CEO.” That’s the opening line I just overheard in the Social Engineering Village @sec_defcon … and yes, they’re currently trying to sweet-talk their way into an airline’s internal systems. Meet the “Rizz Kitties” — a team competing in one
0
4
14
🚀 DEF CON has officially kicked off! 🎉 Just made it through the main entrance and it‘s real, not dreaming, we are here again! If you’re here wandering the halls, hunting for talks, or just soaking up the hacker vibes — come say hi! I especially love meeting newcomers — they
0
0
4
If you ask me, which talk you should visit at DEFCON - here is your answer… 😇😎🥳
0
0
3
What friends do for friends at @BlackHatEvents : Jump starting an iPhone with an iPhone and sharing some energy (literally) ⚡️😂 CC: @madbad9er @V4characters
0
0
1
🎤 “Welcome to the stage… the founder of Black Hat: Jeff Moss!” And Jeff walks on, smiles, and says: “Well… that wasn’t intimidating at all.” 😅 That’s the thing about Black Hat — behind the big stage, bright lights, and intense topics, this event is all about people. 💬 Talk
0
1
7
The biggest event of the year is about to get started! @BlackHatEvents is again @MandalayBay and brings together the whole cyber security community! Looking forward for two intense but awesome days full of networking, new ideas, vulnerabilities and overall meetingold and new
0
1
7
What a blast! 😵💫 Honestly, I kinda feel like our luggage right now: Wasted, a little wacky… but super happy! ✨ And hey, the feedback forms agree! 💥 Now heading to the Trainer Party @BlackHatEvents 🥳🥳🥳 So… should we get a new one, or keep it because it looks kinda cute?
0
0
3