Denis Laskov ๐Ÿ‡ฎ๐Ÿ‡ฑ's Avatar

Denis Laskov ๐Ÿ‡ฎ๐Ÿ‡ฑ

@it4sec

Cybersecurity & Technology Leader, Advisor, Hacker, Father. ex-EY, ex-Mercedes-Benz, ex-IBM, ex-IDF. This is my personal account, no work stuff here. TikTok: https://www.tiktok.com/@it4sec

196
Followers
14
Following
883
Posts
29.06.2023
Joined
Posts Following

Latest posts by Denis Laskov ๐Ÿ‡ฎ๐Ÿ‡ฑ @it4sec

Post image

How OBD-II dongles invite hackers into your car: security risks of automotive companion apps. ๐Ÿš˜๐Ÿ”ŒแŠแŠ||แŠ๐Ÿ“ฑ๐Ÿ‘€

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/how-obd-ii...

10.03.2026 17:28 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Hacking the IoT protocol using AI: An LLM โ€œreadsโ€ ~1,200 pages of docs & finds 67 Zero-Days ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐Ÿ’จ๐Ÿฌ๐Ÿ˜ตโ€๐Ÿ’ซ๐Ÿ†

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/hacking-th...

09.03.2026 18:37 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Reverse engineering a $5 Bluetooth dongle from Realtek to turn it into a powerful research tool. ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐Ÿ› ๏ธ๐Ÿ”ต๐Ÿฆท๐Ÿฅท๐Ÿป

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/reverse-en...

08.03.2026 17:47 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Hacking the Secure Boot of a hardened ESP32 SoC: Math + glitching + automation = success. ๐Ÿ”—โšก๏ธโ˜ฃ๏ธ๐Ÿ”€๐Ÿค“

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/hacking-th...

07.03.2026 17:13 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Cybersecurity of drones: threat modeling, key attacks, and many technical details. Recommended! ๐Ÿ‘จโ€๐Ÿ’ปแŠแŠ||แŠ๐Ÿ›ฉ๏ธ๐Ÿซจ๐Ÿ’ฅ

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/cybersecur...

06.03.2026 18:25 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Video thumbnail

Unlocking in 18 (!!!) seconds.

06.03.2026 15:55 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Hacking self-driving cars in the real world: laser pointer attacks & drones that make cars disappear. ๐Ÿš—โšก๐Ÿ˜Ž๐Ÿšจ๐Ÿ’ฅ

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/hacking-se...

05.03.2026 16:32 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

Reverse engineering of the Fermax intercom system: ongoing hardware security research. ๐Ÿšช๐Ÿ“ธ๐Ÿ”ฌ ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐Ÿงฐ

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/reverse-en...

04.03.2026 19:08 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Hacking with malicious USB drives or malicious QR codes? The most effective way to break in. ๐Ÿฅท๐Ÿป๐Ÿ’พ๐„ƒ๐„ƒ๐„‚๐„‚๐„€๐„๐„ƒ๐„‚๐„‚๐„ƒ๐Ÿงฑ๐Ÿ†

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/hacking-wi...

03.03.2026 19:12 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

ื—ื’ ืคื•ืจื™ื ืฉืžื—!

03.03.2026 10:06 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

The Iranian regime of ayatollahs is bombing Amazon! ๐Ÿš€๐Ÿ˜ฑ๐Ÿคฃ๐Ÿคก

Details & Status: health.aws.amazon.com/health/status

03.03.2026 08:52 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

How to become a Android ๐—ฬถ๐–บฬถ๐–ผฬถ๐—„ฬถ๐–พฬถ๐—‹ฬถ security researcher: malware, exploitation and more. ๐ŸŽ“๐Ÿ”ฌ๐Ÿ‘จ๐Ÿปโ€๐Ÿญ๐Ÿง ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/how-to-bec...

02.03.2026 19:38 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Hacking a Linux device with TPM + LUKS encryption: extracting the TPM key from SPI in plaintext. ๐Ÿง๐Ÿ’ป๐Ÿ‘‚๐Ÿ”‘๐ŸŽ‰

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/hacking-a-...

01.03.2026 17:25 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Anyone interested in checking a potentially Iranian APK that masks itself as "Red Alert" and sent as SMS campaign? :)

Sample: www.virustotal.com/gui/file/836...

01.03.2026 13:46 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Hacking a GE fridge with a hardened STM32: Bypassing new protections to extract flash memory. ๐ŸงŠ๐Ÿช›๐Ÿ‘จโ€๐Ÿ’ป๐Ÿช ๐Ÿ’พ

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/hacking-a-...

28.02.2026 18:22 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Security & privacy in the Tile tracking system: the first (public) security analysis of its protocol. ๐Ÿพ๐Ÿ—บ๏ธ๐ŸŽฏ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐Ÿ› ๏ธ

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/security-a...

27.02.2026 19:05 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Hacking using AI-written exploits: human tests of LLM agentsโ€™ PoCs show they are almost all fake. ๐Ÿค–๐Ÿ–‹๏ธ๐Ÿ“œ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐Ÿคก

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/hacking-us...

26.02.2026 19:29 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Hacking ~7000 DJI vacuum cleaners using AI: technical details of an MQTT broker misconfiguration. ๐Ÿงน๐Ÿค–๐ŸŒ๐Ÿ•ต๐Ÿปโ€โ™‚๏ธ๐Ÿคฏ

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/hacking-70...

25.02.2026 18:38 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Hidden internals of an EV battery pack: details and insights for automotive security experts. โšก๐Ÿš—๐Ÿ”‹โ™ป๏ธ๐Ÿ‘€

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/hidden-int...

24.02.2026 17:52 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Hacking a stolen laptop: bypassing Windows security (BitLocker etc.) using PCI connector. ๐Ÿ’ป๐Ÿ”ฌ๐Ÿ˜ˆ๐Ÿ‰๐ŸŽ‰

More details on
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/hacking-a-...

23.02.2026 18:22 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Write-up on a new wireless vulnerability in trucks: flaw in the seed-key algorithm of SAE J2497. ๐Ÿ‘จโ€๐Ÿ’ป๐Ÿ›œ๐Ÿ‘‚๐Ÿš›โ›”

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/write-up-o...

22.02.2026 18:47 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Hacking vehicle ECUs by brute-forcing diagnostic keys: a practical security assessment of UDS and OBD. ๐Ÿš˜๐Ÿ› ๏ธ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐ŸŽฐ๐ŸŒŸ

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/hacking-ve...

21.02.2026 20:04 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

RF sensors: how to hack them or use them in attacks: leaking data from closed rooms and more! ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐Ÿ”€๐Ÿ“ก๐Ÿ“ณ๐Ÿ‘€

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/rf-sensors...

20.02.2026 18:26 ๐Ÿ‘ 0 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Hacking (or defending) autonomous cars: threat modeling & finding the sweet spot for attacks. ๐Ÿš™๐Ÿค–๐Ÿ‘€๐ŸŽฏ๐Ÿ’ฅ

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/hacking-or...

19.02.2026 21:49 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

How to become a hardware ๐—ฬถ๐–บฬถ๐–ผฬถ๐—„ฬถ๐–พฬถ๐—‹ฬถ security researcher: from lab setup to fault injection and glitching.๐ŸŽ“๐Ÿ”ฌ๐Ÿ‘จ๐Ÿปโ€๐Ÿญ๐Ÿง ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/how-to-bec...

18.02.2026 18:06 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Hacking real vessels: NMEA 2000, the maritime network standard - key security flaws and attacks. ๐Ÿšข๐Ÿ–ง๐Ÿ’‰๐Ÿ‘พ๐Ÿ†˜

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/hacking-re...

17.02.2026 19:18 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Hardware hacking for movies and TV shows: tech insights into how special effects are made. ๐Ÿค–๐ŸŽฌ๐ŸŽฅ๐Ÿ› ๏ธโœจ

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/hardware-h...

16.02.2026 17:51 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Hacking an Autel EV charger for free electricity: full RCE via Bluetooth and USB. โ›ฝโšก๐Ÿš˜๐Ÿ›œโ˜ ๏ธ

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/hacking-an...

15.02.2026 18:40 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Making hardware trojans using AI: artificial intelligence in hardware design and cybersecurity. ๐Ÿ“Ÿ๐Ÿค–๐Ÿ’‰โ˜ฃ๏ธ๐ŸŽฐ

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/making-har...

14.02.2026 17:17 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Security assessment of the Furbo pet camera: DES-encrypted password and 17 issues found. ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐Ÿ”ฌ๐Ÿ“ท๐Ÿบ๐Ÿฑ

More details on:
LinkedIn: www.linkedin.com/posts/dlasko...
Substack: it4sec.substack.com/p/security-a...

13.02.2026 18:30 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0