John Loucaides

1K posts

John Loucaides

John Loucaides

@JohnLoucaides

SVP of Strategy at Eclypsium. Device security. Researcher. Borg. Views expressed here are my own.

Katılım Ekim 2016
344 Takip Edilen342 Takipçiler
John Loucaides retweetledi
Xeno Kovah
Xeno Kovah@XenoKovah·
I'm trying to start a positive security trend of #ResearchRespect wherein we give shoutouts to researchers whose work we really respect and describe why. I'll go first (in no particular order) with "Attacking Intel BIOS" by Rafal Wojtczuk and @AlexTereshkin at BlackHat 2009
English
2
6
56
5.7K
John Loucaides retweetledi
Xeno Kovah
Xeno Kovah@XenoKovah·
I’m glad this mentioned explicitly that it’s for the threat model of “Harvest Now, Decrypt Later”. Because until all the SecureBoot infrastructure is also post-quantum, the “attacker can sign arbitrary code for bootloader” attack assumption would still allow realtime coms capture
Ivan Krstić@radian

🔺New on the Apple Security Research blog: introducing PQ3, a groundbreaking post-quantum cryptographic protocol for iMessage. To our knowledge, PQ3 has the strongest security properties of any at-scale messaging protocol in the world. security.apple.com/blog/imessage-…

English
0
2
16
2.3K
John Loucaides retweetledi
Daniel Walsh
Daniel Walsh@rhatdan·
Lots of noise about `CVE-2024-21626 runc container escape`. As long as you have SELinux enabled, the container processes are blocked from reading sensitive data and writing all data. Podman enables SELinux by default and defaults to rootless mode.
English
0
54
108
8.5K
John Loucaides retweetledi
Nikolaj Schlej
Nikolaj Schlej@NikolajSchlej·
If any random UEFI vendor wants to learn something from #LogoFAIL other than demanding 300+ days of embargoe that then gets broken by the very same vendor, let it be "we need to invest in exploitation prevention and hardening, because securing 10M+ LOC of C and ASL is impossible"
English
4
30
69
9.9K
John Loucaides
John Loucaides@JohnLoucaides·
@dragosr @ryanaraine Standardization of system firmware has made attack reuse easier. (To be fair it made patching easier too) There are complications, sure, but for attackers, I would argue that system firmware attacks are actuality easier than many common attacks on browsers, OS components, etc.
English
0
0
1
30
John Loucaides
John Loucaides@JohnLoucaides·
@dragosr @ryanaraine We have definitely completed coordinated disclosure with patch and publication in 90 days for uefi. It's possible. Depending on how much the dependencies cascade, that can become too aggressive. In my experience, 180 days is usually enough for these. 300 seems excessive.
English
1
0
2
64
John Loucaides retweetledi
Eclypsium
Eclypsium@eclypsium·
We're excited to announce our collaboration w/@Intel to provide enhanced visibility into supply chains by integrating key supply chain & vulnerability insights from Intel’s Endpoint Cloud Services into Eclypsium's Infrastructure #SupplyChainSecurity suite! bit.ly/3QUSxmD
English
0
2
4
389
John Loucaides retweetledi
Jrod
Jrod@Jr0dR87·
How does this make you feel?
Jrod tweet media
English
177
146
1.2K
127.8K
John Loucaides retweetledi
UEFI Forum
UEFI Forum@UEFIForum·
A #UEFI Forum webinar presented by @Intel focused on the changes made to the #EDK2 version of the #Python interpreter that were necessary to run @CHIPSEC. The presenters provide an overview of the Chipsec framework and why it’s useful: bit.ly/3FQmoHc
English
0
4
6
265
John Loucaides
John Loucaides@JohnLoucaides·
Like BIOSdisconnect before it, this allows attack code to download and run from the unmodified, legitimate updater. With so many update apps doing different things, it's very hard to be sure what to trust. Are you more secure updating frequently or tightly controlling updates?
English
0
0
1
45
John Loucaides
John Loucaides@JohnLoucaides·
@eclypsium (and many others) has published about a lot of attacks targeting update apps. The recent issue with gigabyte is a different variation, though. This update app is installed by firmware and fails to secure what it downloads and runs.
English
1
0
1
64
John Loucaides retweetledi
Xeno Kovah
Xeno Kovah@XenoKovah·
I talked with @securityweekly recently about firmware security and #OST2. Thankfully Paul asked questions about how OST2 helps teach fwsec, when I went off into the weeds on fwsec, since it's something I like talking about youtube.com/watch?v=gXaDBH…
YouTube video
YouTube
English
1
6
30
3K