Thyrasec https://www.thyrasec.com/ Tue, 13 Feb 2024 08:33:13 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.3 https://www.thyrasec.com/wp-content/uploads/2023/12/cropped-thyrasec-logo-01-32x32.png Thyrasec https://www.thyrasec.com/ 32 32 Reviewing BLE and Bluetooth Vulnerabilities and Attacks of 2023 https://www.thyrasec.com/blog/reviewing-ble-and-bluetooth-vulnerabilities-and-attacks-of-2023/?utm_source=rss&utm_medium=rss&utm_campaign=reviewing-ble-and-bluetooth-vulnerabilities-and-attacks-of-2023 Tue, 13 Feb 2024 08:33:12 +0000 https://www.thyrasec.com/?p=323 We’ve seen a lot of attacks against Bluetooth and BLE over the last few years. Some ...

Read More from Reviewing BLE and Bluetooth Vulnerabilities and Attacks of 2023

The post Reviewing BLE and Bluetooth Vulnerabilities and Attacks of 2023 appeared first on Thyrasec.

]]>
Top 6 Bluetooth Vulnerabilities https://www.thyrasec.com/blog/top-6-bluetooth-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=top-6-bluetooth-vulnerabilities Sun, 11 Feb 2024 09:27:13 +0000 https://thyrasec.com/?p=140 Over the last few years we’ve seen a slew of vulnerabilities found in Bluetooth and Bluetooth ...

Read More from Top 6 Bluetooth Vulnerabilities

The post Top 6 Bluetooth Vulnerabilities appeared first on Thyrasec.

]]>
Medical Device Cybersecurity https://www.thyrasec.com/blog/medical-device-cybersecurity/?utm_source=rss&utm_medium=rss&utm_campaign=medical-device-cybersecurity Tue, 30 Jan 2024 08:18:14 +0000 https://www.thyrasec.com/?p=463 Medical device cybersecurity is a critical aspect of healthcare technology, aimed at protecting medical devices and ...

Read More from Medical Device Cybersecurity

The post Medical Device Cybersecurity appeared first on Thyrasec.

]]>
Using OpenSSL for Securing Bluetooth and Wireless Devices https://www.thyrasec.com/blog/using-openssl-for-securing-bluetooth-and-wireless-devices/?utm_source=rss&utm_medium=rss&utm_campaign=using-openssl-for-securing-bluetooth-and-wireless-devices Sun, 28 Jan 2024 03:44:00 +0000 https://www.thyrasec.com/?p=434 In the rapidly evolving world of embedded systems, security has become a paramount concern. With the ...

Read More from Using OpenSSL for Securing Bluetooth and Wireless Devices

The post Using OpenSSL for Securing Bluetooth and Wireless Devices appeared first on Thyrasec.

]]>
Building BlueZ – For Defense and Offense https://www.thyrasec.com/blog/building-bluez-for-defense-and-offense/?utm_source=rss&utm_medium=rss&utm_campaign=building-bluez-for-defense-and-offense Fri, 19 Jan 2024 06:36:06 +0000 https://www.thyrasec.com/?p=418 What’s BlueZ BlueZ is an open-source Bluetooth stack implementation for Linux-based operating systems. The stack implementation ...

Read More from Building BlueZ – For Defense and Offense

The post Building BlueZ – For Defense and Offense appeared first on Thyrasec.

]]>
Bluetooth Vulnerabilities in Android, MacOS, iOS, Linux let attackers inject data https://www.thyrasec.com/blog/bluetooth-hid-vulnerabilities-in-android-macos-ios-linux-let-attackers-inject-data/?utm_source=rss&utm_medium=rss&utm_campaign=bluetooth-hid-vulnerabilities-in-android-macos-ios-linux-let-attackers-inject-data Thu, 18 Jan 2024 05:04:33 +0000 https://www.thyrasec.com/?p=351 2024 has barely started, and a researcher has already publicly disclosed several vulnerabilities related to Bluetooth ...

Read More from Bluetooth Vulnerabilities in Android, MacOS, iOS, Linux let attackers inject data

The post Bluetooth Vulnerabilities in Android, MacOS, iOS, Linux let attackers inject data appeared first on Thyrasec.

]]>
Happy New Year and Hello 2024 https://www.thyrasec.com/blog/happy-new-year-and-hello-2024/?utm_source=rss&utm_medium=rss&utm_campaign=happy-new-year-and-hello-2024 Sun, 31 Dec 2023 23:00:00 +0000 https://www.thyrasec.com/?p=308 2023 is now over, and we wanted to thank everyone on the Thyrasec team that had ...

Read More from Happy New Year and Hello 2024

The post Happy New Year and Hello 2024 appeared first on Thyrasec.

]]>
BLE Attacks and Real World Consequences https://www.thyrasec.com/blog/ble-attacks-and-real-world-consequences/?utm_source=rss&utm_medium=rss&utm_campaign=ble-attacks-and-real-world-consequences Sun, 31 Dec 2023 08:27:20 +0000 https://www.thyrasec.com/?p=311 The Flipper Zero platform has been a boon for penetration testing. If you don’t know about ...

Read More from BLE Attacks and Real World Consequences

The post BLE Attacks and Real World Consequences appeared first on Thyrasec.

]]>
Extracting Firmware from EEPROM, Flash and eMMC https://www.thyrasec.com/blog/extracting-firmware-from-eeprom-flash-and-emmc/?utm_source=rss&utm_medium=rss&utm_campaign=extracting-firmware-from-eeprom-flash-and-emmc Tue, 12 Dec 2023 22:11:24 +0000 https://www.thyrasec.com/?p=257 We’ve previously covered some of the best tools for reversing firmware that you should be using, ...

Read More from Extracting Firmware from EEPROM, Flash and eMMC

The post Extracting Firmware from EEPROM, Flash and eMMC appeared first on Thyrasec.

]]>
Firmware Reversing and Analysis Tools https://www.thyrasec.com/blog/firmware-reversing-and-analysis-tools/?utm_source=rss&utm_medium=rss&utm_campaign=firmware-reversing-and-analysis-tools Tue, 12 Dec 2023 08:31:10 +0000 https://www.thyrasec.com/?p=198 Firmware sits at the core of almost every electronic product today. It’s at the heart of ...

Read More from Firmware Reversing and Analysis Tools

The post Firmware Reversing and Analysis Tools appeared first on Thyrasec.

]]>