Press Releases

pnt SBA Announces Recipients of Tibbetts Awards for Demonstrating Significant Economic and Social Impact from R&D Funding Washington, DC (GlobeNewswire), 01.14.2021
pnt Red Balloon Security and Atredis Partners Announce New Strategic Partnership New York, NY (Bussiness Wire), 12.20.2019
pnt Red Balloon Security Partners with Siemens to Deliver Cybersecurity to Building Automation Systems New York, NY (Bussiness Wire), 12.10.2019
pnt Red Balloon Security Partners with Nautilus Hyosung America to Strengthen Security in Their Retail ATMs New York, NY (Bussiness Wire), 11.11.2019
pnt Red Balloon Security Discovers Critical Vulnerability in Millions of Cisco Switches, Routers, and Firewalls New York, NY (Bussiness Wire), 05.13.2019
pnt Six Companies Join the Auto-ISAC, Three Members and Three Strategic Partners Washington, DC (PRWEB) 07.16.2018
pnt Red Balloon Security Partners with Auto-ISAC to Promote Stronger Automotive Cybersecurity New York, NY (PRWEB) 07.13.2018
pnt News Release: DHS S&T Announces Four SBIR Awards to Secure Mobile Device Firmware Washington, DC (DHS) 06.30.2018
pnt Red Balloon Security Announces Strategic Partnership with In-Q-Tel Automotive Cybersecurity Washington, DC (INQTEL) 04.18.2018
pnt Red Balloon Security Raises $21.9 Million in Series A Investment for Embedded Device Cybersecurity New York, NY (PRWEB) 04.03.2018
pnt Red Balloon Security Supports Increased Security for High-risk U.S. Research Facilities New York, NY (PRWEB) 01.17.2018
pnt News Release: DHS S&T Awards $747K to NYC Small Business to Develop Hybrid Malware Prediction System Washington, DC (DHS) 10.05.2017
pnt Red Balloon Security Launches Military-Grade Cyber Defense Tool for Auto Industry New York, NY (PRWEB) 06.21.2017
pnt HP Announces World’s Most Secure Printers Barcelona (HP) 09.22.2015


pnt This startup mails job applicants an encrypted hard drive with Bitcoin on it as a test of their hacking skills because good cybersecurity talent is so hard to find Business Insider, 01.09.2021
pnt Nautilus ATM Flaws Could Allow Hackers Access to Cash, Data Bloomberg, 11.11.2019
pnt We're Surrounded by Billions of Internet-connected Devices. Can We Trust Them? Newsweek, 10.24.2019
pnt What to expect from China, as U.S. companies continue to cut ties with Huawei Yahoo! News, 05.23.2019
pnt WATCH: @redballoonsec CEO Ang Cui on the implications of $CSCO router vulnerability, #thrangrycat 😾 TD Ameritrade, 05.14.2019
pnt 'Hard-to-fix' Cisco flaw puts work email at risk BBC, 05.14.2019
pnt It's 2019 so now security vulnerabilities are branded using emojis: Meet Thrangrycat, a Cisco router secure boot flaw The Register, 05.13.2019
pnt A Cisco Router Bug Has Massive Global Implications Wired, 05.13.2019
pnt Red Balloon Security CEO: Connecting devices with 5G creates new attack service for hackers Fox Business, 04.19.2019
pnt This researcher found a way to change what pixels you see on your PC monitor. That hack ended up on 'Mr. Robot' Business Insider, 04.13.2019
pnt The Danger of Self-Driving Cars Chedder, 01.16.2019
pnt Die Hard is a Movie About Building Automation Insecurity. Discuss. The Security Ledger, 12.25.2018
pnt Defending the Grid Against Cyber Sabotage Energy Central, 10.12.2018
pnt Security must evolve with connectivity if automobiles are to stay safe Intelligent Transport, 07.30.2018
pnt The Overlooked Problem of 'N-Day' Vulnerabilities Dark Reading, 03.26.2018
pnt A New Way to Track Down Bugs Could Help Save IoT Wired, 01.18.2018
pnt A cybersecurity expert showed us how hackers can tap into an office phone and listen to everything you're saying Business Insider, 11.29.2017
pnt What a cyberwar with North Korea could look like, according to a cybersecurity expert Business Insider, 11.09.2017
pnt Hackers can gain access to your computer monitor — a cybersecurity expert shows us how easy it is Business Insider, 11.06.2017
pnt A Brief History of Symbiote Defense Medium, 10.16.2017
pnt Red Balloon announces Symbiote for Automotive Defense to save your car from being hacked Digit, 06.27.2017
pnt This software wants to protect millions of cars from hackers Road Show by CNET, 06.21.2017
pnt A Diabolical Way of Hackin a Chip with a Wave of Your Hand Wired, 06.21.2017
pnt Red Balloon Security Inc. Wins $2.54 Million Federal Contract Bloomberg, 06.08.2017
pnt These Are Some Frightening Ways Your Office Tech Can Compromise Employee Data Fast Company, 02.14.2017
pnt Red Balloon Security Announces Advanced Host Based Security For Embedded Devices Dark Reading, 09.24.2015
pnt Hacker Turns Secure Computers Into Secret-Spewing Radios PC Mag, 08.06.2015
pnt U.S. researchers show computers can be hijacked to send data as sound waves Reuters, 08.05.2015
pnt How To Turn a Cheap Printer Into A Stealthy Bugging Device Motherboard, 08.05.2015
pnt Computers Can Be Hacked to Send Data as Sound Waves: Researchers NBC News, 08.05.2015
pnt How your washing machine can steal computer files CNN, 08.05.2015
pnt How to turn a phone into a covert bugging device? Infect the printer Arstechnica, 02.28.2014
pnt Meet the Symbiote: The Ironclad, Adaptable Future of Antivirus Protection Gizmodo, 02.26.2013
pnt A Guide to Spying on Cisco Phone Calls The New York Times, 02.05.2013
pnt Eavesdropping on your phone from anywhere in the world Fox News, 01.08.2013
pnt Cisco IP Phones Hacked Fast Company, 12.19.2012
pnt Cisco VoIP Phones Affected By On Hook Security Vulnerability Forbes, 12.06.2012
pnt Auto-Immune: "Symbiotes" Could Be Deployed to Thwart Cyber Attacks Yahoo, 11.26.2012


Finding N-Day Vulnerabilities in ICS Embedded Devices

S4 Events, 04.02.2018

Hackers Can Compromise Your Computer Monitor

Tech Insider, 11.16.2017

A Monitor Darkly - Reversing and Exploiting Ubiquitous

DEF CON 24, 08.04.2016

How Hackers Could Wirelessly Bug Your Office

Motherboard, 06.29.2016

Emanate Like A Boss: Generalized Covert Data Exfiltration With Funtenna

Black Hat, 08.01.2015

Watch Red Balloon Security Pitch at HADD

HADD, 02.12.2015

Stepping P3wns: Adventures in Full Spectrum Embedded Exploitation & Defense

RSA Conference, 05.08.2014

DEF CON 21 - Ang Cui and Michael Costello - Stepping P3wns

DEF CON 21, 12.17.2013

DEF CON 20 - Ang Cui - Embedded Device Firmware Vulnerability Hunting Using FRAK

DEF CON 20, 10.30.2013