On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Bypassing password protection and getting a shell through UART in NEC Aterm WR8165N Wi-Fi router

We started out by trying to connect to the router via UART…


Our team’s vulnerabilities disclosures 2022

We devote time to reporting vulnerabilities in open-source…


A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers

Pentesters use a comprehensive and complete toolkit to…


AWS Common Issues – Part 2

Pentesters use a comprehensive and complete toolkit to…


New research findings from Faraday goes to DEF CON

Pentesters use a comprehensive and complete toolkit to…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Password strength

Passwords are the first aspect of computer security we…


Securing open source software (Part 2)

Open-source software increases its presence in data…


Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to…