top of page


When our Lives Hang on
IoT: The Backdoor in Your Heartrate Monitor
A widely used patient monitor—the Contec CMS8000—has been confirmed to contain embedded backdoor functions that allow remote code...

Norbert
Apr 223 min read
41 views
0 comments


ESP32 Bluetooth "Backdoor": Hype, Reality, and the Future of IoT Security
Last week yielded another headline that sounded like a cybersecurity nightmare: “Undocumented backdoor found in Bluetooth chip used by a...

David
Mar 193 min read
62 views
0 comments


Blockchain for Business Leaders: An Unbreakable Security Solution?
Discover the security challenges of blockchain technology. While decentralized and transparent, blockchain isn't unbreakable—learn about its

Norbert
Mar 143 min read
53 views
0 comments


AirTags Reimagined: A New Era of Covert Tracking?
Apple’s AirTag technology enables precise item tracking, but researchers have found ways to exploit it.

David
Mar 103 min read
68 views
0 comments


Record DDoS Attacks: Rising Threats from IoT-Based Botnets
Record DDOS attacks: Rising Threats from IoT-Based Botnets

Norbert
Feb 273 min read
103 views
0 comments


The Hidden Backdoor: A Three-Year Supply Chain Attack on Go Developers
In the world of modern software development, trust is the foundation on which applications are built. But when that trust is exploited,...

Norbert
Feb 123 min read
118 views
0 comments
bottom of page