DEEP THOUGHTS & SHINY THINGS

The latest in Red Balloon Security’s innovations and industry insights.

Hacking Randomized Linux Kernel Images at the DEF CON 33…

Introducing RASPUTIN: Automated Hardware Reversing by Red Balloon Security

Hacking Secure Software Update Systems at the DEF CON 32…

Red Balloon Security Identifies Critical Vulnerability in Kratos NGC-IDU

Hacking In-Vehicle Infotainment Systems with OFRAK 3.2.0 at DEF CON…

Brief Tour of OFRAK 3.1.0

The Power of ChatGPT, in the Palm of My OFRAK

In OFRAK 3.0.0, the App Writes the Code for You

How to Patch Functions with OFRAK’s FunctionReplacementModifier

Brief Tour of OFRAK 2.2.1

Critical Architectural Vulnerabilities in Siemens SIMATIC S7-1500 Series Allow for…

How to Instantly Accomplish Your New Year’s Resolution to Try…

Exploring OFRAK’s Minimap View

NAND Flash Dumps Made Easier with OFRAK 

Baets by Der

Red Balloon Security Wins 2022 NSF Convergence Accelerator Award for…

OFRAK: A BOON TO THE CYBER SECURITY COMMUNITY, EMBEDDED DEVICE…

DEF CON 30 Badge Fun with OFRAK

Embedded Systems and Aerospace & Satellite Cybersecurity

ICS-CERT vulnerability analysis

Why embedded device security is essential to ICS systems

RBS’s Satellite 2022 Conference quick take on cybersecurity: Increasing urgency,…

Adventures of Captain Obvious Issue #24.2

Symbiote Injection Process

DHS, Department of Commerce get it right: Firmware security is…

Adventures of Captain Obvious Issue #17.5

Shmancybear Funsomware Request

A security assessment of protection relays uncovers cybersecurity weaknesses

Ransomware installation on embedded devices is possible, because we’ve done…