Research blog

We believe in the transformative power of digitalization

We actively contribute to technology evolution by finding weaknesses so that better technology can emerge. Our research interests cover diverse technology areas, but generally focus on complex systems with many users. It is our mission to inform these users of the risk of today’s systems.

Category
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Black Basta Buster: Decrypting files without paying the ransom
hacking projects
open source
2/8/2024
Mobile anonymity software package “blue-merle” gets a 2.0 release
telco
open source
1/24/2024
Advanced fuzzing unmasks elusive vulnerabilities
fuzzing
open source
10/16/2023
Telco security retreat 2023
telco
team
10/16/2023
Blue Merle: Reducing your cellular footprint
telco
open source
2/2/2023
EDRs decrease your enterprise security, unless properly hardened
redteam
8/24/2022
Smarter is not always wiser: How we hacked a smart payment terminal
hacking projects
device hacking
8/16/2022
Hacking mobile networks has gotten a lot more interesting with 5G and Open RAN
telco
redteam
8/8/2022
Extended Android security check: SnoopSnitch tests for Java vulnerabilities
android
open source
5/12/2022
-->