By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.
Key Lessons for Auto Manufacturers from the 2021 Tesla Hack
In this blog post, we’ll talk about the methodologies and techniques involved in exploiting vehicle systems, using the 2021 Tesla exploit as an example.
What is an SBOM? Exploring SBOM Origins and Use in Software Security
In this blog post, we'll break down what an SBOM is, where they came from, and how recent legislation has outlined their use in software supply chain security.
While experimenting with shellcode from a seemingly functional source, I discovered a hidden vulnerability. It took me a while to spot the problem. Can you?