Amichai Shulman Profile
Amichai Shulman

@amichaishulman

Followers
144
Following
1
Statuses
32

Israel
Joined July 2011
Don't wanna be here? Send us removal request.
@amichaishulman
Amichai Shulman
3 years
@TalBeerySec The problem is that when you dig into AV (and EDR) logs in general you can find evidence for the JFK murder as well. The question is how do we make sense of it in real time not in hindsight - then we can start talking about prevention
0
0
2
@amichaishulman
Amichai Shulman
3 years
.@vm_call here's a way to sneak your #Apple SSID string attack past user scrutiny. Our blog shows that similar hiding techniques apply to #Windows #Android #Ubuntu
2
1
4
@amichaishulman
Amichai Shulman
3 years
We found all major operating systems vulnerable to some variation of this issue and notified all vendors. For more details about the vulnerability see my blog post:
0
1
4
@amichaishulman
Amichai Shulman
3 years
RT @TalBeerySec: @gentilkiwi maybe some #PrintNightmare magic?
0
1
0
@amichaishulman
Amichai Shulman
4 years
RT @TalBeerySec: "A New Approach to Securing Authentication Systems' Core Secrets" Nice coverage by @DarkReading @kellymsheridan of our @Ze
0
4
0
@amichaishulman
Amichai Shulman
4 years
The NSA released last week guidance for connecting to public Wi-Fi networks. While doing a very good job of shedding light on this issue, the document quickly defaults to putting responsibility in the hand of users. Read more on this in my blog
0
0
0
@amichaishulman
Amichai Shulman
4 years
RT @TalBeerySec: 3/ Pure anomalies may work in a very homogeneous environment of many same machines (not users!) doing the same work "Trea…
0
1
0
@amichaishulman
Amichai Shulman
4 years
You can read my original blog post here: ZecOps full analysis of this issue here: and Gordon Kelly’s follow up in Forbes here:
0
0
4
@amichaishulman
Amichai Shulman
4 years
We ran a short survey among friends in the incident response community. Results are highlighted in my blog. Spoiler alert - airborne threat are REAL!
0
1
2
@amichaishulman
Amichai Shulman
4 years
@vm_call Although this latest iPhone Format String flaw is perceived as seemingly benign, the implications of this vulnerability stretch far and beyond any joking matter. More insights in my blog post
0
5
13
@amichaishulman
Amichai Shulman
4 years
@TalBeerySec There are actually two levels of "user interaction". One is like this case where you actually need to connect, the other is that you simply have to look at the list of nearby networks ...
0
0
4
@amichaishulman
Amichai Shulman
4 years
I was asked about the new #Amazon #Sidewalk and whether it affects corporate security. Bottom line: it exposes the corporate network to potential attacks from data packets transmitted in the corporate airspace by untrusted devices. Why? Read more here:
0
0
0
@amichaishulman
Amichai Shulman
4 years
The overall effect of their disclosure is hence, much higher. Coupled with #AntennaForHire, they are a perfect attack storm and leave no network traces. See my blog:
0
0
4
@amichaishulman
Amichai Shulman
4 years
Why is this attack significant? A **remote** attacker controlling an #AntennaForHire in the proximity of a secure network can bypass **any** existing security mechanism to launch a **remote** attack against that network.
1
1
1
@amichaishulman
Amichai Shulman
4 years
In the past few months we’ve seen growing interest in #AWDL #security. What people fail to realize IMHO is that these are NOT just proximity-based attacks. A remote attacker that takes control of an insecure wireless device (think security camera) and use it as #AntennaForHire
0
0
1
@amichaishulman
Amichai Shulman
5 years
@TalBeerySec I think that Deepfake AI is now being used to spread Deepfake news...
1
0
0