Secure Boot in the Era of the T2
Today, the Duo Labs team is releasing an in-depth look at Apple’s new approach to secure boot as described in Apple’s T2 Security Chip Overview.
As Duo's security research team, Duo Labs is dedicated to disrupting, de-risking and democratizing complex security topics and sharing their innovations with the broader community. Learn more: duo.com/labs
157 Articles Found
Today, the Duo Labs team is releasing an in-depth look at Apple’s new approach to secure boot as described in Apple’s T2 Security Chip Overview.
In this post, we’ll explore how fake followers operate, showing how to find an initial list of fake followers and then using this initial list to uncover a larger botnet measuring at least 12,000 accounts.
Duo Labs has found an authentication weakness in Apple's Device Enrollment Program (DEP) that could lead to privileged access, rogue device enrollment and social engineering attacks against an organization that uses DEP for mobile device management (MDM) auto-enrollment.
Visually mapping social network connections reveals patterns that may otherwise be hidden in the data. Plus, these graphs serve as compelling pieces of generated artwork. This post shows the step-by-step process to create a graph of your own social network using Gephi.
Duo Labs releases their results of a three-month long research project on identifying Twitter bots and botnets at a large scale ahead of their talk at Black Hat USA 2018, along with plans to open-source their data collection code source.