Repeat after me: routers are computers running software that may be vulnerable.
#HardwareHacking
--
Law enforcement shuts down botnet made of tens of thousands of hacked routers | TechCrunch share.google/8YDTmTcb3WTN...
Repeat after me: routers are computers running software that may be vulnerable.
#HardwareHacking
--
Law enforcement shuts down botnet made of tens of thousands of hacked routers | TechCrunch share.google/8YDTmTcb3WTN...
I had a great time on Jim's podcast discussing malware analysis, reverse engineering, working at Dragos, and a little bit of my personal history.
www.youtube.com/watc...
Important notice for OT environments.
βUsers have reported their devices were updated from Windows 11 version 24H2 to 25H2 without authorization.β
share.google/yFQ66466QPr5...
Interesting.
What do you think?
--
Memory bit flips cause up to 15% of Firefox crashes, asserts Mozilla engineer β figure inferred from 470,000 auto-submitted crash reports | Tom's Hardware share.google/da5YE7ab1UxV...
Today is a good day to check ALL of your edge protection.
Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical share.google/GPrycC23G9i1...
Location information provided by the apps you install on your phone is available for sale to anyone.
Feds Used Online Advertising Data to Track the Public's Phone Locations share.google/GeebTCOsGMdT...
Come join my Birds of a Feather (BOF) session at RSA where we discuss unexpected wireless hardware in our equipment. How to find it, what to do about it. It's a open discussion. I'd like to hear your thoughts.
path.rsaconference.com/flow/rsac/us...
#SANSInstitute #RSAC2026 #SansICS
Good security info here.
Maybe the basics aren't so basic after all?
Or just not particularly common.
Attackers keep finding the same gaps in security programs - Help Net Security share.google/1QGED52NW61q...
I would bet this is based on "experience" from intelligence agencies. Locations to affect operations is easier when the device has "forever days".*
*Forever day, kind of like a zero day except it will never be patched.
www.bleepingcomputer.com/news/securit...
Don't pay these attackers
Don't fund their second houses.
Don't make their boat payments.
Don't finance their retirement.
If you pay them, they will come.
Even if you pay them you still have to do the security.
And sometimes paying them doesn't work.
www.theregister.com/2026/02/04/n...
Working with RF and a commercial($$$) Faraday cage is tricky. My SDR radio is sealed inside. Watch as RF is radiated from me to the laptop traveling the USB cable into the Faraday cage and the SDR receiver.
photos.app.goo.gl/6GzoNdygezMn...
@sansinstitute.bsky.social
#HardwareHacking
#SEC617
These are the high scorers in my SCADA security class in D.C. last month. What a great bunch of folks!
@sansinstitute.bsky.social
#SANSICS
#ScadaSecurity
#Bluetooth #HardwareHacking
Denmark Orders Public Officials to Turn Off Their Bluetooth Due to High Risk of Being Spied on by U.S. Intelligence
share.google/nBgXDPRRKxaq...
Hardware Hacking Workshop at RSA.
Attend my hands-on hardware hacking workshop: program a microcontroller to attack a computer, and keep the device when you're done.
#HardwareHacking
#SANS
I am alternately amazed by AI's grunt work and appalled by its stupidity.
It always teases me in programming projects by getting to 80% done very quickly and 100% done frequently never...
I'm excited about getting my new bread rack put together in my below ground lair.Β Itβs giving me more space for upcoming projects.
#HardwareHacking
#BelowGroundLair
#LaBORatory
#HarwareHacking, a little out of the ordinary. A Wall-e robot repair.
#walle
#Robot
#Repair
www.linkedin.com/pulse/hardwa...
Hat tip to @randirain.bsky.social
China using a more redundant approach to PNT, position navigation and timing, including ground stations as opposed to only space-based "GPS" as most countries do.
breakingdefense.com/2026/01/chin...
In Washington DC teaching a cyber security class for critical infrastructure.
My workshop after class was a lot of fun and a big hit.
A participant said: "The highlight? Monta Elkins's hands-on workshop, where we programmed a $4 microcontroller to execute USB HID attacks. "
Curious.
FBI looking for unjammable drones.
The FBI is hunting for 'unjammable' drones β and these flying cameras use one very old-school trick to stop remote attacks | TechRadar share.google/i43iIVcIQHfF...
I hear there's a really good talk happening Tuesday night, live and online. :)
#HardwareHacking.
Sign up here:
www.sans.org/orlando-fall...
"Shutdown Sparks 85% Increase in US Gov't Cyberattacks"
share.google/cfhUcXE7JlIK...
Hardware hacking always wins.
Hacking a casino card shuffling machine.
#HardwareHacking
www.wired.com/story/how-ha...
:0
If you've been in my classes, we've talked about this.
--
Cache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technica share.google/61TQ9VlXy6iJ...
Electric sector critical infrastructure protection audit issues in 2025.
--
FERC 2025 CIP Audit Findings: AMPYX CYBER share.google/WY1HSRXdnBcP...
@ampyxcyber.com
Repeat after me: switches are computers running software that may be vulnerable.
If you've ever been in one of my classes you already know this.
#HardwareHacking
Cisco Warns of Actively Exploited SNMP Vuln Allowing RCE or DoS in IOS Software
share.google/W7KPY69grqZ1...
Come join me at SANS Cyber Defense Initiative in Washington DC and learn about security controls for critical infrastructure.
We'll have a blast!
My UV glasses to harden my clear fingernail polish w/ UV light. The polish insulates and tacks down the small wires I soldered.
RP2040 with a 1.28" color LCD display.
No good place to grab 3.3V volts except directly on the voltage regulator output pin. :(
#HardwareHacking