Baets by Der

Friendly advice from Red Balloon Security: Just pay the extra $2 Recently, we wanted to use some wired headphones with an iPhone, which sadly lacks a headphone jack. The nearest deli offered a solution: a Lightning-to-headphone jack adapter for only $7. Got to love your local New York City bodega.ย  ย  But a wrinkle appeared: […]

Red Balloon Security Wins 2022 NSF Convergence Accelerator Award for Proposed Improvements to 5G Cybersecurity Through Hardening of Embedded Devices

Weโ€™re one of 16 teams chosen to enhance the secure operation of 5G infrastructure. Red Balloon Security has received a $682,000 award from the National Science Foundationโ€™s Convergence Accelerator Program, which includes participation in Phase 1 of the programโ€™s Track G: Securely Operating Through 5G Infrastructure. The Department of Defense is aligned with the NSF […]

DEF CON 30 Badge Fun with OFRAK

The TL;DR? We used OFRAK to rewrite the badge firmware so that it auto-plays the solution for Challenge 1. Check out our video and full breakdown.

Embedded Systems and Aerospace & Satellite Cybersecurity

Red Balloon Security White Paper ย  Defending From Within: Why Embedded Systems Are the Essential to Achieving Space and Satellite Cybersecurityย  Table of Contents: ย  Executive Summaryย  ย  State of Cybersecurity in Space and Satellite Systemsย  The Global Landscape 3 Shaping a Safer Futureย  ย  RedBalloonSecurity Investigationsย  CyberLeo 2022ย Defend from Within: Symbiote Embedded Defense for […]

ICS-CERT vulnerability analysis

What’s in a vulnerability: Evaluating host-based defense through recent ICS device data We analyzed data from the national vulnerability database to assess the applicability of on-device security features Whether they are discovered by independent researchers, manufacturers, or cyber attackers, device vulnerabilities traditionally have been remedied via patching. Although reactive, patchingโ€™s effectiveness is easy enough to […]

Why embedded device security is essential to ICS systems

Protections at the device level are not a replacement for security controls in OT systems and networks. Theyโ€™re a necessary extension of them. Embedded devices in industrial control systems (ICS) operate within an increasingly complex array of systems, networks and protocols. The complexity is only increasing as end users require more insight into how ICS […]

RBSโ€™s Satellite 2022 Conference quick take on cybersecurity: Increasing urgency, few immediate solutions

The Ukrainian conflict amplified serious questions about satellite security in this yearโ€™s conference. But questions arenโ€™t action, which is needed now to protect this critical industry.ย  The Ukrainian conflict amplified serious questions about satellite security in this yearโ€™s conference. But questions arenโ€™t action, which is needed now to protect this critical industry.ย  The Ukrainian conflict […]

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.