Denis Laskov ๐Ÿ‡ฎ๐Ÿ‡ฑ

@it4sec
389 Followers
51 Following
1.2K Posts

Cybersecurity & Technology Leader, Advisor, Hacker, Father.

Today: Chief Hacker at EY

ex-Mercedes-Benz, ex-IBM, ex-IDF.

This is my personal account, no work stuff here.โ€ฉโ€ฉ

Site: https://it4sec.github.io/โ€จโ€จ
Twitter @it4sec

Hardware Hacking 101: A series of great hands-on articles about JTAG, UART, SPI, and hardware glitching. ๐Ÿ‘ฉ๐Ÿปโ€๐Ÿ’ป๐Ÿ“Ÿ๐Ÿ› ๏ธโšก๏ธ๐ŸŽ“

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_cybersecurity-infosec-technology-activity-7366497166942449665-SKO1
Substack: https://it4sec.substack.com/p/hardware-hacking-101-a-series-of

Wait, do you trust this charging gun? Bypass authentication and inject data into all 7(!!) charging gun standards. โ›ฝโšก๐Ÿ’‰๐Ÿš™๐Ÿ˜ข

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_automotive-electric-infosec-activity-7366161570487242752-eN2S
Substack: https://it4sec.substack.com/p/wait-do-you-trust-this-charging-gun

Real-world OT cybersecurity: key concepts and challenges in OT, and why a screwdriver๐Ÿช› is essential. ๐Ÿญ๐Ÿšง๐Ÿ’ฅ๐Ÿ‘ป

More detail on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_cybersecurity-infosec-technology-activity-7365822187368333312-SauG
Substack: https://open.substack.com/pub/it4sec/p/real-world-ot-cybersecurity-key-concepts

AI for cybercriminals and malware creators: What are uncensored LLMs and how are they created? ๐Ÿ˜ˆ๐Ÿค– โฏโฏ๐Ÿ’ป๐Ÿ˜ฑ

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_artificialintelligence-machinelearning-cybersecurity-activity-7365410979112714241-rFMN
Substack: https://it4sec.substack.com/p/ai-for-cybercriminals-and-malware

RCE on iOS from simply viewing an image?

In the update, Apple fixed only one vulnerability:

CVE-2025-43300 in the ImageIO framework, which results in memory corruption when processing a malicious image.

Quite careful description does not match to me with such an urgent update.

How to build and operate a spy balloon: Your chance to recreate a famous spy incident from 2023 for just โ‚ฌ400. โ˜๏ธ๐ŸŽˆ๐Ÿ“น ๐Ÿช‚

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_technology-diy-infosec-activity-7364713174643757058-OeOv
Substack: https://it4sec.substack.com/p/how-to-build-and-operate-a-spy-balloon

Injecting (or hiding) fire, barcodes, or humans into CCD cameras with electromagnetic shots. ๐Ÿ“ท ๐Ÿ’‰๐ŸŒฒ๐Ÿ”ฅ๐ŸŒฒ

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_technology-infosec-digital-activity-7364360172313501696-zRFU
Substack: https://it4sec.substack.com/p/injecting-or-hiding-fire-barcodes

Tesla cars: how to add and activate a custom SIM in the Model 3, Model Y, and Cybertruck step by step.๐Ÿš˜แŠแŠ||แŠ๐Ÿ›ฐ๏ธ๐Ÿ˜ˆ

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_tesla-automotive-cybersecurity-activity-7363995154052984832-O1Lk
Substack: https://it4sec.substack.com/p/tesla-cars-how-to-add-and-activate

Hacking medical images for fraud or targeted harm: using AI to attack medical deep learning systems. ๐Ÿฉปโ˜ข๏ธ๐Ÿฅท๐Ÿป๐Ÿชฆ

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_infosec-medical-cybersecurity-activity-7363632599044341761-eZiY
Substack: https://it4sec.substack.com/p/hacking-medical-images-for-fraud

Aircraft cybersecurity: from real-world attacks (such as spoofing ADS-B or exploiting ACARS) to modern hacking techniques. โœˆ๏ธ แฏค ๐ŸŒ€๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐Ÿ‘€

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_aviation-avionics-technology-activity-7363258608106532864-T95x
Substack: https://it4sec.substack.com/p/aircraft-cybersecurity-from-real

ร—

Securing the Internet of Medical Things (IoMT): One-stop shop for healthcare cybersecurity professionals. ๐Ÿฅ ๐Ÿฉป ๐Ÿ›ก๏ธ๐Ÿ’ฅ

More details on:
LinkedIn: https://www.linkedin.com/posts/dlaskov_healthcare-medical-technology-activity-7361086690129551362-UZBt
Substack: https://it4sec.substack.com/p/securing-the-internet-of-medical