
Paul Asadoorian @[email protected]
@securityweekly
Followers
76K
Following
3K
Media
6K
Statuses
19K
Founder of Security Weekly, Principal Security Evangelist at Eclypsium
Rhode Island
Joined February 2008
Today I am launching a new website: https://t.co/lLbP30nknj - Here you can find my latest blog posts, links to all of my social media platforms, videos/slides of my presentations, links to all of my podcasts, lists of other podcasts I listen to and more!
7
19
73
Check out BombShell: The Signed Backdoor Hiding in Plain Sight on Framework Devices ( https://t.co/5kpwVW9kFq) for a complete write-up of the vulnerabilities and remediation.
eclypsium.com
Eclypsium researchers have discovered UEFI shells, authorized via Secure Boot, on Framework laptops. The UEFI shells contain capabilities that allow attackers to bypass Secure Boot on roughly 200,000...
0
2
2
Trust is something earned, except in the case of Secure Boot, where trust is often overlooked and never verified. Enter UEFI shells, included in many system utilities, have to be signed to work with Secure Boot. Functionality in UEFI shells allows attackers to bypass Secure Boot.
2
1
4
2
5
48
When ransomware starts to skirt around Secure Boot and OS security controls, defenders will be at a disadvantage. HybridPetya shows that attackers are paying attention, leveraging exploitation techniques that bypass the root of trust to deploy malware.
1
0
1
Do you have Cisco ASA devices on your network? Do you know about them all? If they are exposed to the Internet, attackers likely know. Check out my latest article that reveals some scanning trends (thanks to GreyNoise) , available exploits, and EOL info for ASAs. Article:
0
1
5
Spent some time with the T-Lora Pager from Lilygo: - Launcher firmware is supported - Successfully boots Bruce and/or Meshtastic. - I could only get Meshtastic 2.7.x for it, even when I built it from source - Building Bruce and Meshtastic from source is pretty easy, once
1
2
11
🔥 Bold moves get funded. If you’re serious about raising capital, start with your brand. Sightbox helps founders turn great ideas into investable brands — fast.
0
0
14
The movie "Hackers" was released 30 years ago today. It still stands as my favorite hacker movie. What is your favorite "Hackers" movie quote? Here are some reasons why it remains my favorite: - The hacker handles suggested by Joey were aliases of real hackers (at the time) -
67
107
706
My article "EOL Devices: Exploits Will Continue Until Security Improves" is now available here: https://t.co/CSHnOS8eTT
0
1
0
EOL devices are something you often find in the dusty corners of an organization's IT infrastructure. Legacy devices are now a popular target for threat actors, providing a prime location to hide and a rich attack surface. How are you identifying EOL devices, and what is the
1
0
2
Found a great guide to upgrading your graphics card
1
4
12
When disaster strikes, speed matters. Call 1-800-SERVPRO to get back up and running quickly! ⏱️
1
0
3
Someone keeps stealing the drives out of these digital signs, please stop...
0
1
3
We did this once when Doug and I built a PC live on the air, fun times!
3
1
18
Temporary means permanent in IT speak
3
0
14
If your crypto wallet’s touching seven figures, you’ve officially outgrown DIY management. It’s time for structures, protection and strategy. Work with professionals who understand digital wealth.
1
6
45
Do you remember your 1980s Blackberry?
32
13
231