Amichai Shulman
@amichaishulman
Followers
144
Following
1
Statuses
32
@TalBeerySec The problem is that when you dig into AV (and EDR) logs in general you can find evidence for the JFK murder as well. The question is how do we make sense of it in real time not in hindsight - then we can start talking about prevention
0
0
2
RT @TalBeerySec: "A New Approach to Securing Authentication Systems' Core Secrets" Nice coverage by @DarkReading @kellymsheridan of our @Ze…
0
4
0
RT @TalBeerySec: 3/ Pure anomalies may work in a very homogeneous environment of many same machines (not users!) doing the same work "Trea…
0
1
0
@vm_call Although this latest iPhone Format String flaw is perceived as seemingly benign, the implications of this vulnerability stretch far and beyond any joking matter. More insights in my blog post
0
5
13
@TalBeerySec There are actually two levels of "user interaction". One is like this case where you actually need to connect, the other is that you simply have to look at the list of nearby networks ...
0
0
4
The overall effect of their disclosure is hence, much higher. Coupled with #AntennaForHire, they are a perfect attack storm and leave no network traces. See my blog:
0
0
4
Why is this attack significant? A **remote** attacker controlling an #AntennaForHire in the proximity of a secure network can bypass **any** existing security mechanism to launch a **remote** attack against that network.
1
1
1
In the past few months we’ve seen growing interest in #AWDL #security. What people fail to realize IMHO is that these are NOT just proximity-based attacks. A remote attacker that takes control of an insecure wireless device (think security camera) and use it as #AntennaForHire
0
0
1