Toni HuttunenIntroduction to Hidden Risks in Single-Page ApplicationsIn this blog, we discuss common security mistakes in SPAs’ content handling.5 min read·3 days ago----
Janne TaponenUBI or Not UBI: Insights from Examining 50+ NAND FlashesIn this article, we share a collection of techniques, insights, and challenges associated with analyzing NAND flashes in embedded devices.21 min read·Oct 31, 2023----
Mirko SchicchiNavigating Kubernetes Incident Response with Falco, CRIU and OpenFaaSIn this blog we delve into creating a simple, yet effective, incident response mechanism within Kubernetes.11 min read·Sep 28, 2023----
Janne TaponenFrom Zero to BGA Hero: Assessing Chips With Abridged Datasheets, Part 3Unlock the secrets of BGA chips with limited datasheets. Learn advanced methods and essential tools for effective circuit analysis.11 min read·Aug 30, 2023----
Janne TaponenShielded Secrets: The Need to Reassess SoM and CoM Security StandardsBeyond the tech jargon, how safe are SoMs and CoMs in our devices? Dive with us to uncover alarming vulnerabilities.6 min read·Aug 9, 2023----
Janne TaponenReversing the PinoutAssessing Chips With Abridged Datasheets, Part 211 min read·Mar 7, 2023----
Janne TaponenNavigating the UnknownPractical Approach To Assessing Chips With Abridged Datasheets, Part 19 min read·Feb 16, 2023----
Janne TaponenNAND On My WatchThis article explains main concepts about working with firmware dumps from NAND flashes using proprietary memory structures.8 min read·Feb 8, 2023----
Tuomo MakkonenDetecting Malicious Drivers on WindowsVulnerable system drivers can be used to disable EDRs from the kernel space. In this article we discuss this attack and countermeasures.8 min read·Nov 7, 2022--1--1
Toni HuttunenTwo Faces of a Same PDF DocumentIn this article, we introduce a parser differential attack targeting PDF readers.6 min read·Jul 1, 2022----