retrage

8K posts

retrage banner
retrage

retrage

@retrage

UEFI/Rust Hypervisor Firmware/VMM/Container Runtime/aarch64/RISC-V/未踏2017/スパクリ

Tokyo, Japan Katılım Kasım 2008
430 Takip Edilen1K Takipçiler
Sabitlenmiş Tweet
retrage
retrage@retrage·
Our paper "svc-hook: hooking system calls on ARM64 by binary rewriting" has been accepted at ACM/IFIP International Middleware Conference. #session6" target="_blank" rel="nofollow noopener">middleware-conf.github.io/2025/program/f…
English
1
8
16
5.8K
retrage
retrage@retrage·
AI驚き屋おじさんになっちゃった
日本語
0
0
1
159
retrage
retrage@retrage·
Daniel is stepping down as a GRUB maintainer GRUBで長いことメンテナやっていたDaniel Kiperさんやめるそうです lists.gnu.org/archive/html/g…
日本語
0
5
12
753
retrage
retrage@retrage·
sushifyしたい
日本語
0
0
0
126
retrage
retrage@retrage·
雪の国会議事堂、練馬ナンバーのパトカー一台止まっているだけというのもとても良かった
retrage tweet media
日本語
0
0
0
244
retrage
retrage@retrage·
桜田門の様子でも見に行くか
日本語
0
0
1
176
retrage retweetledi
株式会社リチェルカセキュリティ
🛡️勉強会×生成AI×責任ある検証で脆弱性を発見🛡️ 社内のセキュリティ勉強会での学びをきっかけに、生成AIを活用した調査手法でハイパーバイザの脆弱性を発見しました。 調査に生成AIをうまく使いつつ、最後は人が責任を持って検証と報告を行った実践記録をぜひご覧ください。 ricercasecurity.blogspot.com/2026/01/blog-p…
株式会社リチェルカセキュリティ tweet media
日本語
0
30
128
18.5K
retrage retweetledi
Paul Asadoorian @paulasadoorian@infosec.exchange
This week’s reporting on the alleged Everest ransomware breach of ASRock Rack should be a wake-up call for anyone relying on modern server, storage, and cloud hardware. When an enterprise vendor’s internal repositories of firmware, BIOS, BMC code, diagnostic tools, and drivers are exposed, supply chain integrity is in jeopardy.  Adversaries gain insight into board layouts, update mechanisms, and secure boot flows, which accelerates vulnerability discovery and makes it easier to craft implants that look “authentic”. Implants come in many shapes and forms,s including repackaged drivers, UEFI images, and recovery media. In the worst case, compromise at this level undermines the hardware root of trust itself: if attackers can subvert firmware signing, update channels, or UEFI components, they can persist below the operating system, survive reimaging, and silently bypass many controls. Incidents like this underscore that supply-chain attacks targeting firmware and UEFI are now strategic targets, not edge cases. Defenders need to assume that detailed knowledge of platform internals is in adversary hands and respond by monitoring below the OS as a first-class requirement.  Measuring firmware integrity at boot, continuously attesting critical components (UEFI, BMC, NICs, RAID controllers), and watching out-of-band management paths for anomalous behavior is important. The trust model for infrastructure is shifting, and security programs that do not include firmware and UEFI telemetry are already behind the curve. Article: cyberdaily.au/security/13120…
Paul Asadoorian @paulasadoorian@infosec.exchange tweet media
English
0
3
2
2.3K
retrage
retrage@retrage·
@orumin 実際良いです(今のところ
日本語
1
0
1
98
retrage
retrage@retrage·
Meraki Go APが壊れたのでUniFi教に改宗した
日本語
0
0
1
914
retrage retweetledi
Alex Matrosov
Alex Matrosov@matrosov·
Checked out the new website (bootkits.io) for "Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats" by @vxradius , @sergeybratus and me. The new book is in progress, stay tuned!
Alex Matrosov tweet media
English
4
86
393
24.2K
retrage
retrage@retrage·
自宅の作業マシンにNanoKVM導入。ワークステーションとかに付いているBMCよりも取り回しが楽
日本語
0
0
1
313
retrage
retrage@retrage·
今年一番成長をかんじたこと: 意識してメタ認知が多少できるようになったこと
日本語
0
0
1
212