CUTTING EDGE INSIGHTS WITH DIRECT COMMERCIAL APPLICATIONS

Members of the Red Balloon Security team have led research activities funded by the U.S. Government’s DoD and DHS,

including DARPA, NAVSEA, and AFRL.

CUTTING EDGE INSIGHTS WITH
DIRECT COMMERCIAL
APPLICATIONS

Members of the Red Balloon Security team have led research activities funded by the

U.S. Government’s DoD and DHS, including DARPA, NAVSEA, and AFRL.

CUTTING EDGE INSIGHTS WITH DIRECT COMMERCIAL APPLICATIONS

Members of the Red Balloon Security team have led research activities funded by the U.S. Government’s DoD and DHS, including DARPA, NAVSEA, and AFRL.

PIADC FACILITY

Commercializing tech for deployment

U.S. Government funded Red Balloon research to bring advanced on-device security with real-time detection to production-network building controllers.

NYANSAT

Three-part satellite hacking workshop

Research for NyanSat resulted in a workshop for the Department of the Air Force and U.S. Defense Digital Service

HSBC&L

Everyday ATM security

Persistent bypass of Nautilus Hyosung’s ATM security measures.

PIADC FACILITY

Commercializing tech for deployment

U.S. Government funded Red Balloon research to bring advanced on-device security with real-time detection to production-network building controllers.

NYANSAT

Three-part satellite hacking workshop

Research for NyanSat resulted in a workshop for the Department of the Air Force and U.S. Defense Digital Service

HSBC&L

Everyday ATM security

Persistent bypass of Nautilus Hyosung’s ATM security measures.

Commercializing tech for deployment

U.S. Government funded Red Balloon research to bring advanced on-device security with real-time detection to production-network building controllers.

Three-part satellite hacking workshop

Research for NyanSat resulted in a workshop for the Department of the Air Force and U.S. Defense Digital Service

Everyday ATM security

Persistent bypass of Nautilus Hyosung’s ATM security measures.

THRANGRYCAT

Defeating Cisco's secure boot

Red Balloon discovered a vulnerability which allows an attacker to persistently bypass Cisco’s proprietary secure boot mechanism and lock out future updates.

A MONITOR DARKLY

Is your monitor displaying the truth?

Reversing and exploiting ubiquitous on-screen display controllers in modern monitors.

BADFET

Defeating secure boot

Defeating modern secure boot using second-order pulsed electromagnetic fault injection.

THRANGRYCAT

Defeating Cisco's secure boot

Red Balloon discovered a vulnerability which allows an attacker to persistently bypass Cisco’s proprietary secure boot mechanism and lock out future updates.

A MONITOR DARKLY

Is your monitor displaying the truth?

Reversing and exploiting ubiquitous on-screen display controllers in modern monitors.

BADFET

Defeating secure boot

Defeating modern secure boot using second-order pulsed electromagnetic fault injection.

Defeating Cisco's secure boot

Red Balloon discovered a vulnerability which allows an attacker to persistently bypass Cisco’s proprietary secure boot mechanism and lock out future updates.

Is your monitor displaying the truth?

Reversing and exploiting ubiquitous on-screen display controllers in modern monitors.

Defeating secure boot

Defeating modern secure boot using second-order pulsed electromagnetic fault injection.

FUNTENNA

Breaking the air-gap

Improvisation of a RF transmitter via GPIO to overcome air-gapped systems.

DARPA RADICS PROGRAM

Protecting the power grid

Red Balloon provided embedded defense to protection relays, RTUs and network equipment to increase device protection, detect attacks and bring device level forensics.

LADS

Secure device monitoring

Optically isolated monitoring of embedded device cybersecurity status for the US military.

FUNTENNA

Breaking the air-gap

Improvisation of a RF transmitter via GPIO to overcome air-gapped systems.

DARPA RADICS PROGRAM

Protecting the power grid

Red Balloon provided embedded defense to protection relays, RTUs and network equipment to increase device protection, detect attacks and bring device level forensics.

LADS

Secure device monitoring

Optically isolated monitoring of embedded device cybersecurity status for the US military.

Breaking the air-gap

Improvisation of a RF transmitter via GPIO to overcome air-gapped systems.

Protecting the power grid

Red Balloon provided embedded defense to protection relays, RTUs and network equipment to increase device protection, detect attacks and bring device level forensics.

Secure device monitoring

Optically isolated monitoring of embedded device cybersecurity status for the US military.

PROTECT YOUR SYSTEMS AGAINST EXPLOITATION

PROTECT YOUR SYSTEMS AGAINST EXPLOITATION

PROTECT YOUR SYSTEMS AGAINST EXPLOITATION

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.

LEVERAGE OUR EXPERTISE FOR YOUR SECURITY NEEDS

Reach out to learn more about our embedded security offering and to schedule a demo.