Research blog

We believe in the transformative power of digitalization

We actively contribute to technology evolution by finding weaknesses so that better technology can emerge. Our research interests cover diverse technology areas, but generally focus on complex systems with many users. It is our mission to inform these users of the risk of today’s systems.

Category
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Your Blockchain is only as secure as the application on top of it
blockchain
3/22/2022
When your phone gets sick: FluBot abuses Accessibility features to steal data
android
telco
12/21/2021
Chaining Three Zero-Day Exploits in ITSM Software ServiceTonic for Remote Code Execution
redteam
11/2/2021
Blockchain security – Six common mistakes found in Substrate chains
blockchain
10/12/2021
Blockchain security – Best practices for your next review
blockchain
9/27/2021
Balancing long-term technology evolution with short-term side-effects - Vulnerability disclosure best practices
device hacking
9/13/2021
Honeypot research shows variety of DDoS amplification methods
redteam
7/30/2021
Achieving Telerik Remote Code Execution 100 Times Faster
redteam
cryptography
6/22/2021
Decrypting GSM phone calls
telco
device hacking
open source
6/2/2021
-->