BlueHat IL (@bluehatil) 's Twitter Profile
BlueHat IL

@bluehatil

ID: 780352565615681536

linkhttps://www.microsoftrnd.co.il/bluehatil/home calendar_today26-09-2016 10:25:24

1,1K Tweet

6,6K Followers

522 Following

BlueHat IL (@bluehatil) 's Twitter Profile Photo

Now you see him, now you don't! Ori David takes us deep into VBS Enclaves, a technology that isolates a region of a process's memory, making it completely inaccessible to other processes, the process itself, and even the kernel.

Now you see him, now you don't! <a href="/oridavid123/">Ori David</a> takes us deep into VBS Enclaves, a technology that isolates a region of a process's memory, making it completely inaccessible to other processes, the process itself, and even the kernel.
BlueHat IL (@bluehatil) 's Twitter Profile Photo

Let’s be Authentik - or let attackers do it for you? Maor Abutbul exposed how flaws in open-source IdPs like Keycloak and Authentik can hand over full system control. From ORM Leaks to web race conditions, when your IdP falls, so does your entire organization.

Let’s be Authentik - or let attackers do it for you? Maor Abutbul exposed how flaws in open-source IdPs like Keycloak and Authentik can hand over full system control. From ORM Leaks to web race conditions, when your IdP falls, so does your entire organization.
BlueHat IL (@bluehatil) 's Twitter Profile Photo

Ring, ring
 who’s hacking? Inbar Raz cracked open Israel’s iconic Telecard payphones—literally—unraveling their 80s-era tech and uncovering secrets hidden in their embedded systems. A deep dive into nostalgia, hacking, and a touch of telecom history.

Ring, ring
 who’s hacking? <a href="/inbarraz/">Inbar Raz</a> cracked open Israel’s iconic Telecard payphones—literally—unraveling their 80s-era tech and uncovering secrets hidden in their embedded systems. A deep dive into nostalgia, hacking, and a touch of telecom history.
BlueHat IL (@bluehatil) 's Twitter Profile Photo

The one and only đŸ„đŸłïžâ€đŸŒˆ Benjamin Delpy is back at BlueHatIL with a special keynote: Everything You Never Dared to Ask About Mimikatz—including the infamous question: “Did he really write it just to learn C”?

The one and only <a href="/gentilkiwi/">đŸ„đŸłïžâ€đŸŒˆ Benjamin Delpy</a> is back at BlueHatIL with a special keynote: Everything You Never Dared to Ask About Mimikatz—including the infamous question: “Did he really write it just to learn C”?
BlueHat IL (@bluehatil) 's Twitter Profile Photo

Kicking off Day 2 of #BlueHatIl! On the menu: epic talks, tough challenges, special surprises - and pita with chocolate spread. Don’t judge us.

Kicking off Day 2 of #BlueHatIl! On the menu: epic talks, tough challenges, special surprises - and pita with chocolate spread. Don’t judge us.
BlueHat IL (@bluehatil) 's Twitter Profile Photo

Day two of #BlueHatIL kicks off with a powerhouse keynote by Christopher Glyer, unravelling the dark evolution of ransomware. From profit-driven gangs to state-aligned hackers using it as a smokescreen for cyber warfare - where extortion meets espionage and the stakes get higher.

Day two of #BlueHatIL kicks off with a powerhouse keynote by <a href="/cglyer/">Christopher Glyer</a>, unravelling the dark evolution of ransomware. From profit-driven gangs to state-aligned hackers using it as a smokescreen for cyber warfare - where extortion meets espionage and the stakes get higher.
BlueHat IL (@bluehatil) 's Twitter Profile Photo

Vulnerability Researcher Yarden Shafir takes the BlueHatIL stage to explore surprising ways kernel pointers can still be accessed, even with modern security measures in place. From ASLR to event logs, she dives into the creative techniques researchers use to uncover new attack

Vulnerability Researcher <a href="/yarden_shafir/">Yarden Shafir</a> takes the BlueHatIL stage to explore surprising ways kernel pointers can still be accessed, even with modern security measures in place. From ASLR to event logs, she dives into the creative techniques researchers use to uncover new attack
BlueHat IL (@bluehatil) 's Twitter Profile Photo

Is this some strange Breakfast Club reboot or just our BlueHatIL design for the year? Mystery of the century. Just kidding — it’s totally option B.

Is this some strange Breakfast Club reboot or just our BlueHatIL design for the year? Mystery of the century.
Just kidding — it’s totally option B.
BlueHat IL (@bluehatil) 's Twitter Profile Photo

Time to hack like a robot! Omer Nevo guides us through the logic of LLM-based vulnerability hunters—exploring what they excel at, where they fail spectacularly, and how they've evolved over the past two years.

Time to hack like a robot! Omer Nevo guides us through the logic of LLM-based vulnerability hunters—exploring what they excel at, where they fail spectacularly, and how they've evolved over the past two years.
BlueHat IL (@bluehatil) 's Twitter Profile Photo

Security researchers Avi & Gal Elbaz just dropped a bombshell at BlueHatIL! They revealed a zero-day vulnerability exposing localhost services to remote attacks, showing how Chrome and others are at risk—and why Microsoft Edge is the unsung hero in protecting you!

Security researchers <a href="/avi_lum/">Avi</a> &amp; <a href="/GalElbaz1/">Gal Elbaz</a> just dropped a bombshell at BlueHatIL! They revealed a zero-day vulnerability exposing localhost services to remote attacks, showing how Chrome and others are at risk—and why Microsoft Edge is the unsung hero in protecting you!
BlueHat IL (@bluehatil) 's Twitter Profile Photo

Netanel Ben Simon & Meir Bloya just took us on a deep dive into Windows boot security at #BlueHatIL! From UEFI to boot chain vulnerabilities, they uncovered key findings on securing the boot process and shared their innovative fuzzing approach. What a session!

Netanel Ben Simon &amp; Meir Bloya just took us on a deep dive into Windows boot security at #BlueHatIL! From UEFI to boot chain vulnerabilities, they uncovered key findings on securing the boot process and shared their innovative fuzzing approach. What a session!
BlueHat IL (@bluehatil) 's Twitter Profile Photo

Arad Cohen just blew our minds  with a groundbreaking talk on "Breaking TLS with LLMs"! By combining fuzzing with Large Language Models, he's pushing the boundaries of vulnerability detection in TLS implementations. The future of cryptographic security is here.

Arad Cohen just blew our minds  with a groundbreaking talk on "Breaking TLS with LLMs"! By combining fuzzing with Large Language Models, he's pushing the boundaries of vulnerability detection in TLS implementations. The future of cryptographic security is here.
BlueHat IL (@bluehatil) 's Twitter Profile Photo

Is Your Private Repository Actually Public? bar lanyado & Ophir Dror are taking us on a wild journey full of shocking discoveries and important insights, that began when they encountered a post claiming, "ChatGPT has access to private repository data.

Is Your Private Repository Actually Public? <a href="/BLanyado/">bar lanyado</a> &amp; <a href="/DrorOphir/">Ophir Dror</a> are taking us on a wild journey full of shocking discoveries and important insights, that began when they encountered a post claiming, "ChatGPT has access to private repository data.
BlueHat IL (@bluehatil) 's Twitter Profile Photo

We’re wrapping up BlueHat IL with a brilliant talk by our very own Efim Hudis Keynote: "The 3 Laws of Robotics and How (Not) to Build Secure AI Agents" — from understanding The Intent, through Least Agency Principles, all the way to Preparing for Shift-Up, and beyond.

We’re wrapping up BlueHat IL with a brilliant talk by our very own Efim Hudis Keynote: "The 3 Laws of Robotics and How (Not) to Build Secure AI Agents" — from understanding The Intent, through Least Agency Principles, all the way to Preparing for Shift-Up, and beyond.
BlueHat IL (@bluehatil) 's Twitter Profile Photo

Cyber wizards, start your engines and assemble your squads: The Kusto Detective Agency is back with Call of the Cyber Duty – a brand new competition that’ll push your skills to the limit. And yes, this showdown comes with insane prizes. Register now: detective.kusto.io/register

Cyber wizards, start your engines and assemble your squads: The Kusto Detective Agency is back with Call of the Cyber Duty – a brand new competition that’ll push your skills to the limit. And yes, this showdown comes with insane prizes. Register now: detective.kusto.io/register
BlueHat IL (@bluehatil) 's Twitter Profile Photo

Even mentalist Lior Suchard thinks it's time to add a little magic to your life and join our cyber challenge - The Kusto Detective Agency is back with Call of the Cyber Duty – are you ready to crack the case? Register now: detective.kusto.io/register