Normal view
Before yesterdayResearch Blog by Security Research Labs
Telco security retreat 2023
19 February 2024 at 14:01
- Research Blog by Security Research Labs
- Black Basta Buster: Decrypting files without paying the ransom
Black Basta Buster: Decrypting files without paying the ransom
9 February 2024 at 08:23
- Research Blog by Security Research Labs
- Mobile anonymity software package βblue-merleβ gets a 2.0 release
Advanced fuzzing unmasks elusive vulnerabilities
16 October 2023 at 11:42
SRLabs Hacking-Challenge - 2023
15 November 2023 at 13:05
Fingerprints are not fit for secure device unlocking
26 April 2023 at 11:32
- Research Blog by Security Research Labs
- Balancing long-term technology evolution with short-term side-effects - Vulnerability disclosure best practices
- Research Blog by Security Research Labs
- The Android patch ecosystem β Still fragmented, but improving
Banking regulation has an effect on Hackability
31 March 2023 at 11:39
- Research Blog by Security Research Labs
- Cryptographic problems are reduced to their true hardness by SAT solvers
- Research Blog by Security Research Labs
- Smart Spies: Alexa and Google Home expose users to vishing and eavesdropping
Decrypting GSM phone calls
31 March 2023 at 11:39
- Research Blog by Security Research Labs
- Honeypot research shows variety of DDoS amplification methods
- Research Blog by Security Research Labs
- Legic Prime RFID cards rely on obscurity and consequently did not withstand scrutiny
A decade of hacking β meet the people behind SRLabs
31 March 2023 at 11:39
- Research Blog by Security Research Labs
- Smarter is not always wiser: How we hacked a smart payment terminal
- Research Blog by Security Research Labs
- Your Blockchain is only as secureΒ asΒ theΒ application on top of it
- Research Blog by Security Research Labs
- Simple fuzzing goes a long way, even for critical blockchain software
- Research Blog by Security Research Labs
- New SIM attacks de-mystified, protection tools now available
SIM cards are prone to remote hacking
31 March 2023 at 11:39
- Research Blog by Security Research Labs
- Chaining Three Zero-Day Exploits in ITSM Software ServiceTonic for Remote Code Execution
- Research Blog by Security Research Labs
- When your phone gets sick: FluBot abuses Accessibility features to steal data
- Research Blog by Security Research Labs
- Hacking mobile networks has gotten a lot more interesting with 5G and Open RAN
- Research Blog by Security Research Labs
- Legacy booking systems disclose travelersβ private information
- Research Blog by Security Research Labs
- Incorrectly patched ZyXEL vulnerability becomes zero-day again
- Research Blog by Security Research Labs
- The Hackability of organizations can be measured and compared