DEEP THOUGHTS & SHINY THINGS

The latest in Red Balloon Security’s innovations and industry insights.

Hacking Secure Software Update Systems at the DEF CON 32 Car Hacking Village

Red Balloon Security Identifies Critical Vulnerability in Kratos NGC-IDU

Hacking In-Vehicle Infotainment Systems with OFRAK 3.2.0 at DEF CON 31

Brief Tour of OFRAK 3.1.0

The Power of ChatGPT, in the Palm of My OFRAK

In OFRAK 3.0.0, the App Writes the Code for You

How to Patch Functions with OFRAK’s FunctionReplacementModifier

Brief Tour of OFRAK 2.2.1

Critical Architectural Vulnerabilities in Siemens SIMATIC S7-1500 Series Allow for Bypass of All Protected Boot Features

How to Instantly Accomplish Your New Year’s Resolution to Try Out OFRAK

Exploring OFRAK’s Minimap View

NAND Flash Dumps Made Easier with OFRAK 

Baets by Der

Red Balloon Security Wins 2022 NSF Convergence Accelerator Award for Proposed Improvements to 5G Cybersecurity Through Hardening of Embedded Devices

OFRAK: A BOON TO THE CYBER SECURITY COMMUNITY, EMBEDDED DEVICE MANUFACTURERS, AND END USERS, IN 7 QUESTIONS

DEF CON 30 Badge Fun with OFRAK

Embedded Systems and Aerospace & Satellite Cybersecurity

ICS-CERT vulnerability analysis

Why embedded device security is essential to ICS systems

RBS’s Satellite 2022 Conference quick take on cybersecurity: Increasing urgency, few immediate solutions

Adventures of Captain Obvious Issue #24.2

Symbiote Injection Process

DHS, Department of Commerce get it right: Firmware security is “overlooked,” — and a genuine cybersecurity risk

Adventures of Captain Obvious Issue #17.5

Shmancybear Funsomware Request

A security assessment of protection relays uncovers cybersecurity weaknesses

Ransomware installation on embedded devices is possible, because we’ve done it

LEVERAGE OUR EXPERTISE FOR YOUR EMBEDDED SECURITY NEEDS

Contact us now to discover more about Red Balloon Security’s range of solutions and services or to arrange a demonstration.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

;