news 15
- Foxconn FCC Unlock Sep 15, 2025
- Automated Patch Diff Analysis using LLMs Sep 15, 2025
- Firmware Analysis of the COROS PACE 3 Jul 21, 2025
- Watch Out! Bluetooth Analysis of the COROS PACE 3 Jun 17, 2025
- Hacking a Secure Industrial Remote Access Gateway Aug 11, 2024
- Firmware Security: Alcatel-Lucent ALE-DeskPhone Jul 12, 2024
- Zero Touch Pwn: Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones Aug 11, 2023
- NetSupport RAT distributed via fake invoices Apr 18, 2023
- Abusing Microsoft Teams Direct Routing Sep 1, 2022
- Tampering with Thunderbird attachments under Windows Jul 22, 2022
- Rooting Mitel Desk Phones Through the Backdoor (CVE-2022-29854, CVE-2022-29855) Jun 10, 2022
- Abusing the MS Office protocol scheme Jan 31, 2022
- Extracting Secrets from LSA by Use of PowerShell Jan 12, 2022
- Hacking your Softphone with a malicious Call Oct 13, 2021
- Introducing hallucinate: One-stop TLS traffic inspection and manipulation using dynamic instrumentation Jul 27, 2021