We’ve seen a lot of attacks against Bluetooth and BLE over the last few years. Some …
Read More from Reviewing BLE and Bluetooth Vulnerabilities and Attacks of 2023
We’ve seen a lot of attacks against Bluetooth and BLE over the last few years. Some …
Read More from Reviewing BLE and Bluetooth Vulnerabilities and Attacks of 2023
Over the last few years we’ve seen a slew of vulnerabilities found in Bluetooth and Bluetooth …
Medical device cybersecurity is a critical aspect of healthcare technology, aimed at protecting medical devices and …
In the rapidly evolving world of embedded systems, security has become a paramount concern. With the …
Read More from Using OpenSSL for Securing Bluetooth and Wireless Devices
What’s BlueZ BlueZ is an open-source Bluetooth stack implementation for Linux-based operating systems. The stack implementation …
2024 has barely started, and a researcher has already publicly disclosed several vulnerabilities related to Bluetooth …
Read More from Bluetooth Vulnerabilities in Android, MacOS, iOS, Linux let attackers inject data
2023 is now over, and we wanted to thank everyone on the Thyrasec team that had …
The Flipper Zero platform has been a boon for penetration testing. If you don’t know about …
We’ve previously covered some of the best tools for reversing firmware that you should be using, …
Read More from Extracting Firmware from EEPROM, Flash and eMMC
Firmware sits at the core of almost every electronic product today. It’s at the heart of …