Denis Laskov ๐Ÿ‡ฎ๐Ÿ‡ฑ

@it4sec
405 Followers
47 Following
1.4K Posts

Cybersecurity & Technology Leader, Advisor, Hacker, Father.

ex-EY, ex-Mercedes-Benz, ex-IBM, ex-IDF.

This is my personal account, no work stuff here.โ€ฉโ€ฉ

Site: https://it4sec.github.io/โ€จโ€จ
Twitter @it4sec
TikTok: https://www.tiktok.com/@it4sec

How to hack with a Saleae Logic Analyzer: Tap the TPM, listen to SPI, and bypass disk encryption. ๐Ÿ’ป๐Ÿ“Œ๐Ÿ”ฌ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐Ÿ”‘

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_cybersecurity-embedded-saleae-share-7444107774826934272-oAju
Substack: https://it4sec.substack.com/p/how-to-hack-with-a-saleae-logic-analyzer

Buy a cheap satellite dish and listen: SMS, payment data, and military secrets will fall from the sky. ๐Ÿ›ฐ๏ธแŠแŠ||แŠ๐Ÿ‘‚โœ๏ธ๐ŸŽ–๏ธ

More details:
LinkedIn: https://www.linkedin.com/posts/dlaskov_cybersecurity-satellite-satcom-share-7443727860042833920-ujag
Substack: https://it4sec.substack.com/p/buy-a-cheap-satellite-dish-and-listen

Security analysis of OpenClaw: researchers test the AI coding agent against 47 attack scenarios. ๐Ÿฆž๐Ÿ› ๏ธ๐Ÿ‘€๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐Ÿ“œ

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_cybersecurity-ai-openclaw-activity-7443368519510994944-rNXA
Substack: https://it4sec.substack.com/p/security-analysis-of-openclaw-researchers

Hacking solar energy systems using Google Maps and weak links in the supply chain. ๐Ÿชซโ˜€๏ธ๐Ÿ”‹๐Ÿ˜ˆโ™จ๏ธ

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_cybersecurity-solar-supplychain-activity-7443032840377782272-Yas1
Substack: https://it4sec.substack.com/p/hacking-solar-energy-systems-using

AI agents are like kids - leave them unattended, and theyโ€™ll waste your resources and make a mess. :)

Hacking firmware using Ghidra: tips and tricks for smarter reverse engineering. ๐Ÿ‰๐Ÿ—ก๏ธ๐Ÿง™โ€โ™‚๏ธ๐Ÿ’ŽโœŒ๏ธ

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_cybersecurity-reverseengineering-ghidra-activity-7442650595817308160-HNBB
Substack: https://it4sec.substack.com/p/hacking-firmware-using-ghidra-tips

Fault injection attack on the STM32U5 chip: Hacking the hardware of the Trezor Safe 5 crypto wallet. ๐Ÿ‘จ๐Ÿปโ€๐Ÿญ๐Ÿ“Ÿโšก๐Ÿ˜ตโ€๐Ÿ’ซ๐Ÿ—๏ธ

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_cybersecurity-hacking-trezor-activity-7442301549231644672-8Lb4
Substack: https://it4sec.substack.com/p/fault-injection-attack-on-the-stm32u5

Hacking a $12 smartwatch: from side-channel attacks to a hidden picture of Rick Astley. ๐Ÿง โŒšแŠแŠ||แŠ๐Ÿ‘พ๐Ÿ‘จโ€๐Ÿ’ป

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_cybersecurity-embedded-smartwatch-activity-7441930200461807616-1C_F
Substack: https://it4sec.substack.com/p/hacking-a-12-smartwatch-from-side

Pedestrians can fool autonomous cars: attacking perception models with patched flowers. ๐Ÿค–๐Ÿš—๐ŸŒบ๐Ÿ˜ˆ๐Ÿšจ

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_automotive-autonomous-selfdriving-activity-7441559833691992065-ZFpv
Substack: https://it4sec.substack.com/p/pedestrians-can-fool-autonomous-cars

Breaking into secure wireless networks: Wi-Fi client isolation is broken, and hereโ€™s how. ๐Ÿ›œ๐Ÿ’‰๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐Ÿดโ€โ˜ ๐ŸŒŽ

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_cybersecurity-wireless-hacking-share-7441198838968655872-PR5d
Substack: https://it4sec.substack.com/p/breaking-into-secure-wireless-networks