Thijs Alkemade

515 Followers
301 Following
256 Posts
Security researcher, SEAR.
Personal bloghttps://blog.thijsalkema.de/
Pronunciation[ˈtɛis ˌɑlkəˈmaːdə]
Pronounshe/him

I'm super excited that we get to have a dedicated event on March 5th at Apple Park with sessions on MIE, new tools in Enhanced Security in Xcode and more.

It's the time to learn and ask about our security posture and how to adopt the best defenses in the industry for your own applications and protect the security and privacy of your users.

https://developer.apple.com/events/view/D4MG4S3PJ7/dashboard

Meet with Apple - Apple Developer

Join us around the world for a variety of sessions, labs, and workshops — tailored for you.

Apple Developer

This is the first public talk Ivan @radian has given in 6 years - featuring formal verification of post-quantum cryptography, the evolution of the Secure Page Table Monitor, a view into Memory Integrity Enforcement, updates to Apple Security Bounty... amazing stuff!

https://youtu.be/Du8BbJg2Pj4?si=a9N_lG0faXncC2kQ

HEXACON 2025 - Keynote by Ivan Krstić

YouTube

Apple SEAR is hiring offensive security researchers!

We’re looking for talented researchers across multiple areas of security.

Check out the job description here:
https://jobs.apple.com/en-us/details/200623813-2911/offensive-security-researcher?team=SFTWR

If you’re interested in low level systems like RTOS, firmware, coprocessors, embedded components, or microkernels, my team would especially like to hear from you.

Feel free to reach out if you have any questions.

#infosec

Offensive Security - Researcher - Jobs - Careers at Apple

Apply for a Offensive Security - Researcher job at Apple. Read about the role and find out if it’s right for you.

Are you interested in bleeding-edge microarchitecture offensive security research, with a concrete impact on user security?
We have just opened a Microarchitecture Security Internship position at Apple, in SEAR LASER! ❤️‍🔥

Apply here: https://jobs.apple.com/en-us/details/200624069/microarchitecture-security-internship

Microarchitecture Security Internship - Jobs - Careers at Apple

Apply for a Microarchitecture Security Internship job at Apple. Read about the role and find out if it’s right for you.

After more than 9 years, this is my last week at Computest. I've had a great time here, especially in Sector 7, the security research team we started 5 years ago. Highlights for me are winning Pwn2Own with our 0-click Zoom RCE, our last-minute trips to Miami and Tokyo for other Pwn2Own events, and speaking at Black Hat USA, DEF CON, WHY2025 & MCH2022 and so many other places. I am very grateful for getting the chance to do this work, but now it is time for me to do something else and find some new challenges! 🔥

First talk is done! I think it went quite well.

Next one is tomorrow at 19:00 (probably, it has been moved around a lot already) in Andromeda.

#why2025

Made it to #WHY2025!

Last time we had to give 3 presentations, which was a bit much. So this time we’re doing 3 presentations again of course…

Today on our blog we have a guest post from René Ammerlaan about multiple vulnerabilities he found in Ruckus Unleashed. The most impressive part was how he chained some of them together to go from access to the guest WiFi network to RCE on the controller itself!

https://sector7.computest.nl/post/2025-07-ruckus-unleashed/

#cve #ruckus

Ruckus Unleashed: Multiple vulnerabilities exploited

This blog post describes multiple vulnerabilities found in the firmware of Ruckus Unleashed and ZoneDirector. The vulnerabilities were found and reported to CommScope by René Ammerlaan, a guest writer for this blog post. I will take you through all the vulnerabilities and demonstrate how they can be exploited by an attacker.

Sector 7

About 5 years ago, I reported a vulnerability in iOS allowing apps to spoof the app name when requesting to add a VPN profile. The app could just specify whatever text to show there.

Yesterday, two writeups were posted about other TCC prompts trusting the apps triggering them too much:

https://wts.dev/posts/tcc-who/
https://rambo.codes/posts/2025-05-12-a-privacy-mechanism-that-backfired

It does surprise me that Apple invests so much effort into their sandbox and permission system with the assumption that apps might be malicious, but then keeps messing up the UI around these features.

Can You Really Trust That Permission Pop-Up On macOS? (CVE-2025-31250) | Watch This Space

A security research blog.

Watch This Space
CVE ID: CVE-2024-53704
Vendor: SonicWall
Product: SonicOS
Date Added: 2025-02-18
Vulnerability: SonicWall SonicOS SSLVPN Improper Authentication Vulnerability
Notes: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003 ; https://nvd.nist.gov/vuln/detail/CVE-2024-53704
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-53704
Security Advisory