Advertisement ยท 728 ร— 90

Posts by F4b

Post image Post image

Double trouble at #SOCON2026! Our ninja @kalimer0x00.bsky.social was busy breaking down Microsoft SCCM (once again!), while @quent0x1.bsky.social unveiled new GPO-based attack paths & his latest Bloodhound contributions targeting OUs & AD Sites. Awesome job! ๐Ÿ‘

1 week ago 2 2 0 0
Video

#IT evolvesโ€ฆ and so do attacks. ๐Ÿ›ก๏ธ

Sharpen your skills in March-April 2026 with our #cybersecurity courses: Forensic, Cloud, Active Directory & Malware Analysis.

๐Ÿ“… Limited spots: www.synacktiv.com/en/offers/tr...

2 months ago 1 2 0 0
Preview
On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025 On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025

At #Pwn2Own Berlin 2025, a full exploit chain against VMware Workstation was demonstrated via a heap overflow in the PVSCSI controller.
Despite Windows 11 LFH mitigations, advanced heap shaping and side-channel techniques enabled a reliable exploit.

๐Ÿ” www.synacktiv.com/en/publicati...

2 months ago 6 1 0 0
Post image Post image

On the podium at #Pwn2Own Automotive 2026 ๐Ÿฅ‰

Synacktiv ranked 3rd in Tokyo ๐Ÿ‡ฏ๐Ÿ‡ต after successful attacks on #Tesla Infotainment (USB), #Sony XAV-9500ES (USB) and #Autel MaxiCharger (NFC).

๐Ÿ“ Next stop: Berlin!

2 months ago 5 4 0 0
From Pwn2Own Automotive 2026 Day 1: Synacktiv vs. Tesla
From Pwn2Own Automotive 2026 Day 1: Synacktiv vs. Tesla YouTube video by TrendAI Zero Day Initiative

In a highlight from Day One of #Pwn2Own Automotive 2026, @synacktiv.com targets the #Tesla infotainment system. #P2OAuto
youtube.com/shorts/DKYT-...

2 months ago 6 3 0 0
Post image Post image Post image

Confirmed! Synacktiv (@synacktiv) chained three vulnerabilities to gain root-level code execution on the Sony XAV-9500ES, earning a full win of $20,000 USD and 2 Master of Pwn points. #Pwn2Own #P2OAuto

3 months ago 2 1 0 0
Preview
Wireless-(in)Fidelity: Pentesting Wi-Fi in 2025 Wireless-(in)Fidelity: Pentesting Wi-Fi in 2025

From legacy WEP to WPA3-Enterprise: sharing our recent #WiFi field experiences. ๐Ÿ“ก

We detail various scenarios to better understand the risks, including WPA3 PEAP relaying & optimized online PSK brute-forcing.

โคต๏ธ www.synacktiv.com/en/publicati...

3 months ago 3 2 0 0
Video

โœจ Happy New Year 2026 โœจ

Everyone at REVELยทIO wishes you a successful year ahead.
As digital investigation challenges continue to grow, we remain committed to contributing to a safer future.

Thank you for your trust!

3 months ago 2 1 0 0
Preview
Exploiting Anno 1404 Exploiting Anno 1404

[New blog post] As part of an R&D project, @tomtombinary.bsky.social identified several critical vulnerabilities in the LAN multiplayer mode of the game Anno 1404 (released in 2009) ๐Ÿ”

Want to know more?
Read the full article on our blog ๐Ÿ‘‡
www.synacktiv.com/en/publicati...

4 months ago 3 3 0 0
Advertisement
Preview
ActivID administrator account takeover : the story behind ActivID administrator account takeover : the story behind

HID recently disclosed HID-PSA-2025-002, a critical flaw in the #ActivID Authentication Appliance 8.7.

In our new blog post, @us3r777.bsky.social and @pierregg.bsky.social break down exactly how they uncovered it, from methodology to exploitation ๐Ÿ’ก

Read it here โฌ‡๏ธ
synacktiv.com/en/publicati...

4 months ago 3 2 0 0
Video

Missed @hexacon.bsky.social 2025? ๐Ÿคฏ
Good news, all #Synacktivโ€™s deep-dive talks on offensive research & reverse engineering are now online!

๐ŸŽฅ Watch the full playlist: www.youtube.com/playlist?lis...

#cybersecurity

4 months ago 8 2 0 0
Preview
Breaking the BeeStation: Inside Our Pwn2Own 2025 Exploit Journey Breaking the BeeStation: Inside Our Pwn2Own 2025 Exploit Journey

At #Pwn2Own2025, our experts Tek & @anyfun.bsky.social remotely compromised a Synology Beestation Plus via a pre-auth exploit, leading to full system takeover.

The vuln is now tracked as CVE-2025-12686 ๐Ÿ”

๐Ÿ”— Full write-up: www.synacktiv.com/en/publicati...

4 months ago 4 1 0 0

Meet our #Synacktiv and @revel-io.bsky.social experts at #Milipol, from Tuesday 18 to Friday 21 November 2025!

๐Ÿ“ Visit us at Stand H063 (Hall 4 โ€“ Forensic Zone).

โ„น๏ธ www.milipol.com/fr-FR

5 months ago 1 1 0 0
Preview
Site Unseen: Enumerating and Attacking Active Directory Sites Site Unseen: Enumerating and Attacking Active Directory Sites

[Blogpost] @croco_byte presents how to exploit attack paths related to Active Directory sites' ACLs.
As the latter often constitute a blind spot for AD enumeration tools, the article also describes a pull request aiming to integrate them into the BloodHound project:

5 months ago 2 1 0 0
Post image

See you at #MilipolParis 2025 ๐Ÿ‘‹

๐Ÿ“… November 18-21, 2025
๐Ÿ“ Paris Nord Villepinte - Hall 4, Stand H063 (Forensic Zone)

Meet our experts on site and discover how #REVELยทIO improves the efficiency and reliability of digital investigations

๐Ÿ”— www.milipol.com/en

5 months ago 5 1 0 0
Post image

A big shout-out to the #Synacktiv team for their strong performance at the latest #Pwn2Own competition in Cork!
They proudly secured third place overall ๐Ÿ‘

Next stop: Tokyo for the upcoming edition ๐Ÿ‡ฏ๐Ÿ‡ต ๐Ÿ‘€

More details on the targets and participants here โ„น๏ธ
www.zerodayinitiative.com/blog/2025/20...

5 months ago 3 3 0 0
Advertisement
Post image

#REVELยทIO will be exhibiting at #MilipolParis 2025 ๐Ÿ“ข

Developed by @synacktiv.com, REVELยทIO is the first French digital forensics solution designed to help investigators.

๐Ÿ“ Hall 4 - Forensic zone - Stand H063
๐Ÿ’ก Learn more about Milipol: www.milipol.com/en
๐Ÿ’ก Discover REVELยทIO: revelio.eu

5 months ago 2 1 0 0

Another busy month with many technical talks from the team! ๐Ÿ’ช

Links and more details below ๐Ÿ‘‡๏ธ

5 months ago 1 1 6 0
Preview
Paint it blue: Attacking the bluetooth stack Paint it blue: Attacking the bluetooth stack

Following their presentation at @hexacon.bsky.social, @mtalbi.bsky.social & Etienne detail how they exploited CVE-2023-40129, a critical vulnerability affecting the Bluetooth stack in Android โฌ‡๏ธ

www.synacktiv.com/en/publicati...

5 months ago 6 5 0 0
Post image

๐ŸŽ‰ Big win at #Pwn2Own Cork!

@pol-y.bsky.social of #Synacktiv successfully breached the @Ubiquiti AI Pro surveillance system ๐Ÿฆˆ๐ŸŽถ

What a way to wrap up the challenge - congrats, @pol-y.bsky.social ๐Ÿ’ช

5 months ago 7 6 0 0
Post image

Impressive work from our team today at #Pwn2Own!

@mtalbi.bsky.social and Matthieu just pulled off an exploit on the Philips Hue Bridge without laying a finger on the device!

Great demonstration of Synacktivโ€™s offensive expertise ๐Ÿ‘

Come on ๐Ÿ”ฅ

5 months ago 13 7 0 0
Post image

Congrats to tek and anyfun for landing the first successful entry at #Pwn2OwnCork - exploiting a stack overflow on Synology BeeStation Plus for $40,000 and 4 Master of Pwn points in the process ๐Ÿ’ฅ

Letโ€™s keep pushing ๐Ÿ’ช

#P2OIreland #Synacktiv

6 months ago 4 4 0 0
Preview
Quantum readiness: Hybridizing key exchanges Quantum readiness: Hybridizing key exchanges

Our post-quantum cryptography series continues!

This new article by @bluesheeet.bsky.social unpacks the hybridization of key exchanges, covering theory and implementations.

Read all about why it matters, how to approach it safely, and some misconceptions here ๐Ÿ‘‡
www.synacktiv.com/en/publicati...

6 months ago 1 1 1 0
Advertisement
Post image

LinkPro: new stealthy #Linux rootkit based on eBPF ๐Ÿ”๏ธ

Our #CSIRT team discovered and named LinkPro, a new Linux rootkit, during an incident response. It exploits eBPF for evasion and persistence.
Here are the four key technical points in the image below. ๐Ÿ’ก

๐Ÿ”— www.synacktiv.com/en/publicati...

6 months ago 4 4 0 0
Post image

That's a wrap for Hexacon 2025!

We hope that you've enjoyed the event at least as much as we did ๐Ÿคฉ

Please take a moment to fill out our satisfaction survey and help us make Hexacon 2026 even better ๐Ÿ”ฅ

Thank you for trusting us year after year ๐Ÿ™

6 months ago 5 3 0 0
Post image

๐ŸŽฏ New training session: #ActiveDirectory Intrusion Tactics โ€“ Advanced Level
5 intense days diving into advanced AD intrusion techniques.

Donโ€™t miss our upcoming offensive #cybersecurity courses!
๐Ÿ”— www.synacktiv.com/en/offers/tr...

6 months ago 2 1 0 0
Preview
LLM Poisoning [1/3] - Reading the Transformer's Thoughts LLM Poisoning [1/3] - Reading the Transformer's Thoughts

LLM Poisoning [1/3]: Local LLMs are vulnerable to supply chain attacks.
Inject a trigger-activated Trojan in a LLM. First step, build a probe to read a transformer's pre-down MLP activations to detect your chosen trojan trigger.

๐Ÿ”— Full article www.synacktiv.com/en/publicati...

6 months ago 1 1 0 0
Post image

#LesAssises2025, here we go ๐Ÿš€

Come and meet us at ๐˜€๐˜๐—ฎ๐—ป๐—ฑ ๐—™๐Ÿฎ๐Ÿด to discuss your challenges and find out how we can strengthen your #cyber posture.
Adrien, Augustin and Neder will be on hand to answer all your questions and share their insights.

Seeing you there ๐Ÿค

6 months ago 1 1 0 0
Post image Post image

A look back at our ninjas' first day at @hexacon.bsky.social !

We are proud of our experts Quentin and Etienne, who are leading the โ€˜iOS for Security Engineersโ€™ training course.
At the same time, Matthieu and Paul are hard at work on the โ€˜Azure intrusion for red teamersโ€™ training course ๐Ÿš€

6 months ago 2 1 0 0