Advertisement · 728 × 90

Posts by Jesse D'Aguanno

Unfortunately, security properties address one piece of the overall goal, and are sometimes conflicting. So you have to first identify what _your_ goal is, in terms of security, and implement measures that apply to the properties that are important to that goal.

1 year ago 0 0 0 0

Security isn’t binary. We need to somehow teach people to think in terms of simple threat models.

1 year ago 0 0 1 0

Us: Use MFA for security
Everyone: OK, secure!
Us: Well, only if you’re not being phished, and no one can subvert the delivery mechanism, and …
Everyone: 🙄

1 year ago 0 0 1 0

We (security people) have done a really bad job communicating what security properties are (and aren’t).

Us: Use Signal for security
Everyone: OK, using Signal, now I’m **secure**!
Us: Well, only if the ends aren’t compromised, and you can trust the other parties, and …
Everyone: 🙄

1 year ago 0 0 1 0

+1

1 year ago 0 0 0 0

So Soft, so ICEy

1 year ago 1 0 0 0
Preview
RE//verse RE//verse is a premier reverse engineering, vulnerability research and malware analysis conference. We offer trainings and talks from industry-leading experts.

Really looking forward to the inaugural RE//verse conference this week! See y’all in Orlando!!
re-verse.io

1 year ago 2 0 0 0
Advertisement

I’m getting excited for RE//verse!

1 year ago 0 0 0 0
Post image

We're pleased to announce Natalie Silvanovich @natashenka.bsky.social as the keynote speaker for the inaugural RE//verse. She might have started out hacking Tamagotchis, but she certainly didn't stop there!

1 year ago 17 7 1 2

Wow, that’s high praise. Ordering

1 year ago 0 0 0 0

num

1 year ago 1 0 0 0

Glad to see you’ve gotten on board the Binja train 🚂 😋

1 year ago 1 0 0 0

Oh, I never posted my gotofail story on here.

Early 2014, someone came to me about a catastrophic vulnerability in Apple's TLS implementation.

I shit you not, they'd overheard someone at a bar drunkenly bragging about how they were going to sell it to a FVEY intelligence agency for six figures.

1 year ago 457 101 7 20
A Touch of Pwn - Part I Blackwing Intelligence provides high-end security engineering, analysis, and research services for engineering focused organizations

Boom! 💥
Windows Hello fingerprint authentication bypassed on top three devices:
- Dell Inspiron
- Lenovo ThinkPad
- Microsoft Surface Pro
Still waiting for recordings from our BlueHat talk to drop, but here's our writeup: blackwinghq.com/blog/posts/a...
#infosec #security #vulnresearch

2 years ago 3 1 0 0
Advertisement
A Touch of Pwn - Part I Blackwing Intelligence provides high-end security engineering, analysis, and research services for engineering focused organizations

Boom! 💥
Windows Hello fingerprint authentication bypassed on top three devices:
- Dell Inspiron
- Lenovo ThinkPad
- Microsoft Surface Pro
Still waiting for recordings from our BlueHat talk to drop, but here's our writeup: blackwinghq.com/blog/posts/a...
#infosec #security #vulnresearch

2 years ago 3 1 0 0

There are some legacy security professionals that wear “I don’t code” as a badge of honor, but they’re dying out. Just like traditional system administration was replaced by devops.

2 years ago 3 0 0 0

how to software, any day.

Although my background is in vulnerability research, this is not only applicable to finding vulns, appsec, etc. Security operations, network security, etc.  automation is the future (current in mature orgs).

2 years ago 1 0 1 0

Advice to juniors or those looking to get into #cybersecurity:
Learn to code

Software is at every level of the stack. Strong software engineering skills will serve you well throughout your career. I would rather teach a strong software engineer security over teaching a traditional security person …

2 years ago 2 1 1 0

👋 blue sky

2 years ago 4 0 0 0