Thyrasec Blog

News

Stealing Teslas with Wireless – Car Keyless Entry

Keyless Entry technology, like the one installed in Tesla vehicles, is designed to make it easier …

Read More from Stealing Teslas with Wireless – Car Keyless Entry

Guide

Hacker’s Guide to J-Link Debuggers

The J-Link debugger sold by Segger is a debugger probe for ARM Cortex-M processors like the …

Read More from Hacker’s Guide to J-Link Debuggers

Guide

A Guide to Bluetooth Man-In-The-Middle (MITM)

One of the more challenging aspects of Bluetooth security is dealing with practical attacks. Man-In-The-Middle attacks …

Read More from A Guide to Bluetooth Man-In-The-Middle (MITM)

Guide

Integrating MbedTLS by Example

Adding MbedTLS to your project is a great way to leverage a library designed to help …

Read More from Integrating MbedTLS by Example

General

Reviewing BLE and Bluetooth Vulnerabilities and Attacks of 2023

We’ve seen a lot of attacks against Bluetooth and BLE over the last few years. Some …

Read More from Reviewing BLE and Bluetooth Vulnerabilities and Attacks of 2023

Vulnerability

Top 6 Bluetooth Vulnerabilities

Over the last few years we’ve seen a slew of vulnerabilities found in Bluetooth and Bluetooth …

Read More from Top 6 Bluetooth Vulnerabilities

General

Medical Device Cybersecurity

Medical device cybersecurity is a critical aspect of healthcare technology, aimed at protecting medical devices and …

Read More from Medical Device Cybersecurity

Guide

Using OpenSSL for Securing Bluetooth and Wireless Devices

In the rapidly evolving world of embedded systems, security has become a paramount concern. With the …

Read More from Using OpenSSL for Securing Bluetooth and Wireless Devices

Guide

Building BlueZ – For Defense and Offense

What’s BlueZ BlueZ is an open-source Bluetooth stack implementation for Linux-based operating systems. The stack implementation …

Read More from Building BlueZ – For Defense and Offense

Vulnerability

Bluetooth Vulnerabilities in Android, MacOS, iOS, Linux let attackers inject data

2024 has barely started, and a researcher has already publicly disclosed several vulnerabilities related to Bluetooth …

Read More from Bluetooth Vulnerabilities in Android, MacOS, iOS, Linux let attackers inject data