Research blog

We believe in the transformative power of digitization

We actively contribute to technology evolution by finding weaknesses, so that better technology can emerge. Our research interests cover diverse technology areas, but generally focus on complex systems with many users. It is our mission to inform these users of the risk of today’s systems.

Category
EDRs decrease your enterprise security, unless properly hardened
hacking projects
blockchain
concept
8/16/2022
Smarter is not always wiser: How we hacked a smart payment terminal
blockchain
concept
hacking projects
8/15/2022
Hacking mobile networks has gotten a lot more interesting with 5G and Open RAN
No items found.
8/8/2022
Extended Android security check: SnoopSnitch tests for Java vulnerabilities
No items found.
5/12/2022
Your Blockchain is only as secure as the application on top of it
blockchain
1/25/2022
When your phone gets sick: FluBot abuses Accessibility features to steal data
hacking projects
12/15/2021
Chaining Three Zero-Day Exploits in ITSM Software ServiceTonic for Remote Code Execution
blockchain
11/1/2021
Blockchain security – Six common mistakes found in Substrate chains
No items found.
10/11/2021