Research blog

We believe in the transformative power of digitalization

We actively contribute to technology evolution by finding weaknesses so that better technology can emerge. Our research interests cover diverse technology areas, but generally focus on complex systems with many users. It is our mission to inform these users of the risk of today’s systems.

Category
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Certiception: The ADCS honeypot we always wanted
open source
redteam
6/26/2024
BogusBazaar: A criminal network of webshop fraudsters
No items found.
5/8/2024
Black Basta Buster: Decrypting files without paying the ransom
hacking projects
open source
2/8/2024
Mobile anonymity software package “blue-merle” gets a 2.0 release
telco
open source
1/24/2024
Advanced fuzzing unmasks elusive vulnerabilities
fuzzing
open source
10/16/2023
Telco security retreat 2023
telco
team
10/16/2023
Blue Merle: Reducing your cellular footprint
telco
open source
2/2/2023
EDRs decrease your enterprise security, unless properly hardened
redteam
8/24/2022
Smarter is not always wiser: How we hacked a smart payment terminal
hacking projects
device hacking
8/16/2022