#IT evolvesโฆ and so do attacks. ๐ก๏ธ
Sharpen your skills in March-April 2026 with our #cybersecurity courses: Forensic, Cloud, Active Directory & Malware Analysis.
๐
Limited spots: www.synacktiv.com/en/offers/tr...
#IT evolvesโฆ and so do attacks. ๐ก๏ธ
Sharpen your skills in March-April 2026 with our #cybersecurity courses: Forensic, Cloud, Active Directory & Malware Analysis.
๐
Limited spots: www.synacktiv.com/en/offers/tr...
At #Pwn2Own Berlin 2025, a full exploit chain against VMware Workstation was demonstrated via a heap overflow in the PVSCSI controller.
Despite Windows 11 LFH mitigations, advanced heap shaping and side-channel techniques enabled a reliable exploit.
๐ www.synacktiv.com/en/publicati...
On the podium at #Pwn2Own Automotive 2026 ๐ฅ
Synacktiv ranked 3rd in Tokyo ๐ฏ๐ต after successful attacks on #Tesla Infotainment (USB), #Sony XAV-9500ES (USB) and #Autel MaxiCharger (NFC).
๐ Next stop: Berlin!
In a highlight from Day One of #Pwn2Own Automotive 2026, @synacktiv.com targets the #Tesla infotainment system. #P2OAuto
youtube.com/shorts/DKYT-...
Confirmed! Synacktiv (@synacktiv) chained three vulnerabilities to gain root-level code execution on the Sony XAV-9500ES, earning a full win of $20,000 USD and 2 Master of Pwn points. #Pwn2Own #P2OAuto
From legacy WEP to WPA3-Enterprise: sharing our recent #WiFi field experiences. ๐ก
We detail various scenarios to better understand the risks, including WPA3 PEAP relaying & optimized online PSK brute-forcing.
โคต๏ธ www.synacktiv.com/en/publicati...
โจ Happy New Year 2026 โจ
Everyone at REVELยทIO wishes you a successful year ahead.
As digital investigation challenges continue to grow, we remain committed to contributing to a safer future.
Thank you for your trust!
[New blog post] As part of an R&D project, @tomtombinary.bsky.social identified several critical vulnerabilities in the LAN multiplayer mode of the game Anno 1404 (released in 2009) ๐
Want to know more?
Read the full article on our blog ๐
www.synacktiv.com/en/publicati...
HID recently disclosed HID-PSA-2025-002, a critical flaw in the #ActivID Authentication Appliance 8.7.
In our new blog post, @us3r777.bsky.social and @pierregg.bsky.social break down exactly how they uncovered it, from methodology to exploitation ๐ก
Read it here โฌ๏ธ
synacktiv.com/en/publicati...
Missed @hexacon.bsky.social 2025? ๐คฏ
Good news, all #Synacktivโs deep-dive talks on offensive research & reverse engineering are now online!
๐ฅ Watch the full playlist: www.youtube.com/playlist?lis...
#cybersecurity
At #Pwn2Own2025, our experts Tek & @anyfun.bsky.social remotely compromised a Synology Beestation Plus via a pre-auth exploit, leading to full system takeover.
The vuln is now tracked as CVE-2025-12686 ๐
๐ Full write-up: www.synacktiv.com/en/publicati...
Meet our #Synacktiv and @revel-io.bsky.social experts at #Milipol, from Tuesday 18 to Friday 21 November 2025!
๐ Visit us at Stand H063 (Hall 4 โ Forensic Zone).
โน๏ธ www.milipol.com/fr-FR
[Blogpost] @croco_byte presents how to exploit attack paths related to Active Directory sites' ACLs.
As the latter often constitute a blind spot for AD enumeration tools, the article also describes a pull request aiming to integrate them into the BloodHound project:
See you at #MilipolParis 2025 ๐
๐
November 18-21, 2025
๐ Paris Nord Villepinte - Hall 4, Stand H063 (Forensic Zone)
Meet our experts on site and discover how #REVELยทIO improves the efficiency and reliability of digital investigations
๐ www.milipol.com/en
A big shout-out to the #Synacktiv team for their strong performance at the latest #Pwn2Own competition in Cork!
They proudly secured third place overall ๐
Next stop: Tokyo for the upcoming edition ๐ฏ๐ต ๐
More details on the targets and participants here โน๏ธ
www.zerodayinitiative.com/blog/2025/20...
#REVELยทIO will be exhibiting at #MilipolParis 2025 ๐ข
Developed by @synacktiv.com, REVELยทIO is the first French digital forensics solution designed to help investigators.
๐ Hall 4 - Forensic zone - Stand H063
๐ก Learn more about Milipol: www.milipol.com/en
๐ก Discover REVELยทIO: revelio.eu
Another busy month with many technical talks from the team! ๐ช
Links and more details below ๐๏ธ
Following their presentation at @hexacon.bsky.social, @mtalbi.bsky.social & Etienne detail how they exploited CVE-2023-40129, a critical vulnerability affecting the Bluetooth stack in Android โฌ๏ธ
www.synacktiv.com/en/publicati...
๐ Big win at #Pwn2Own Cork!
@pol-y.bsky.social of #Synacktiv successfully breached the @Ubiquiti AI Pro surveillance system ๐ฆ๐ถ
What a way to wrap up the challenge - congrats, @pol-y.bsky.social ๐ช
Impressive work from our team today at #Pwn2Own!
@mtalbi.bsky.social and Matthieu just pulled off an exploit on the Philips Hue Bridge without laying a finger on the device!
Great demonstration of Synacktivโs offensive expertise ๐
Come on ๐ฅ
Congrats to tek and anyfun for landing the first successful entry at #Pwn2OwnCork - exploiting a stack overflow on Synology BeeStation Plus for $40,000 and 4 Master of Pwn points in the process ๐ฅ
Letโs keep pushing ๐ช
#P2OIreland #Synacktiv
Our post-quantum cryptography series continues!
This new article by @bluesheeet.bsky.social unpacks the hybridization of key exchanges, covering theory and implementations.
Read all about why it matters, how to approach it safely, and some misconceptions here ๐
www.synacktiv.com/en/publicati...
LinkPro: new stealthy #Linux rootkit based on eBPF ๐๏ธ
Our #CSIRT team discovered and named LinkPro, a new Linux rootkit, during an incident response. It exploits eBPF for evasion and persistence.
Here are the four key technical points in the image below. ๐ก
๐ www.synacktiv.com/en/publicati...
That's a wrap for Hexacon 2025!
We hope that you've enjoyed the event at least as much as we did ๐คฉ
Please take a moment to fill out our satisfaction survey and help us make Hexacon 2026 even better ๐ฅ
Thank you for trusting us year after year ๐
๐ฏ New training session: #ActiveDirectory Intrusion Tactics โ Advanced Level
5 intense days diving into advanced AD intrusion techniques.
Donโt miss our upcoming offensive #cybersecurity courses!
๐ www.synacktiv.com/en/offers/tr...
LLM Poisoning [1/3]: Local LLMs are vulnerable to supply chain attacks.
Inject a trigger-activated Trojan in a LLM. First step, build a probe to read a transformer's pre-down MLP activations to detect your chosen trojan trigger.
๐ Full article www.synacktiv.com/en/publicati...
#LesAssises2025, here we go ๐
Come and meet us at ๐๐๐ฎ๐ป๐ฑ ๐๐ฎ๐ด to discuss your challenges and find out how we can strengthen your #cyber posture.
Adrien, Augustin and Neder will be on hand to answer all your questions and share their insights.
Seeing you there ๐ค
A look back at our ninjas' first day at @hexacon.bsky.social !
We are proud of our experts Quentin and Etienne, who are leading the โiOS for Security Engineersโ training course.
At the same time, Matthieu and Paul are hard at work on the โAzure intrusion for red teamersโ training course ๐
๐ข"Paint it Blue: Attacking the Bluetooth stack" by Mehdi Talbi and Etienne Helluy-Lafont