Skip to content

Main Navigation

Thyrasec Logo Thyrasec
  • Home
  • Services
    • Bluetooth Security
    • Product Penetration Testing
    • Medical Device Security
    • Reverse Engineering
  • Blog
  • About
  • Contact

Author: Thyrasec

Profile picture of Thyrasec

Posts by Thyrasec

Happy New Year and Hello 2024

December 31, 2023

2023 is now over, and we wanted to thank everyone on the Thyrasec team that had …

Read More from Happy New Year and Hello 2024

Posted in General

BLE Attacks and Real World Consequences

December 31, 2023

The Flipper Zero platform has been a boon for penetration testing. If you don’t know about …

Read More from BLE Attacks and Real World Consequences

Posted in NewsTagged BLE, DDOS, Flipper Zero

Extracting Firmware from EEPROM, Flash and eMMC

December 12, 2023

We’ve previously covered some of the best tools for reversing firmware that you should be using, …

Read More from Extracting Firmware from EEPROM, Flash and eMMC

Posted in GuideTagged EEPROM, EMMC, Flash, Hardware, Reverse engineering

Firmware Reversing and Analysis Tools

December 12, 2023

Firmware sits at the core of almost every electronic product today. It’s at the heart of …

Read More from Firmware Reversing and Analysis Tools

Posted in GuideTagged BinWalk, Firmware, Ghidra, Reverse engineering, Tools

Bluetooth Security Primer – Classic + BLE

December 7, 2023

Background Bluetooth is one of the most popular wireless protocols for devices. Maybe the biggest reason …

Read More from Bluetooth Security Primer – Classic + BLE

Posted in GuideTagged BLE, Bluetooth, Bluetooth Classic, Bluetooth LE, Encryption, Pairing, Security

Top 10 Wireless Security Issues

December 5, 2023

Wireless systems spread the gamut from narrowband single channel transmitters to multi-gigabit Wi-Fi using OFDMA and …

Read More from Top 10 Wireless Security Issues

Posted in GuideTagged Cryptography, Encryption, Security, Wireless

Wireless Security Challenges

December 3, 2023

Wireless devices are all around us. We rely on them for everything we do, from opening …

Read More from Wireless Security Challenges

Posted in GuideTagged OTA, SDR, Security, Wireless

Open vs Closed Source Stack Security

December 2, 2023

Over the last year, there’s been a few vulnerabilities founds for the Zephyr Bluetooth stack: CVE-2023-5753 …

Read More from Open vs Closed Source Stack Security

Posted in Guide

Thyrasec and Its Mission

December 1, 2023

As our first post to our blog, we wanted to welcome you to our site. At …

Read More from Thyrasec and Its Mission

Posted in General

Posts navigation

  • «
  • 1
  • 2

Share

Subscribe to receive the latest expert news about wireless security

/* real people should not fill this in and expect good things - do not remove this or risk form bot signups */

Other Blog Posts

  • Stealing Teslas with Wireless - Car Keyless Entry

  • Hacker's Guide to J-Link Debuggers

  • A Guide to Bluetooth Man-In-The-Middle (MITM)

  • Integrating MbedTLS by Example

Search

Posts Tags

Attack Automotive BinWalk BLE Bluetooth Bluetooth Classic Bluetooth LE bluez Cryptography DDOS EEPROM Embedded EMMC Encryption Firmware Flash Flipper Zero Ghidra Hardware HID MbedTLS Medical Devices MITM OpenSSL OTA Pairing Relay Attacks Reverse engineering SDR Security Tools Wireless
Logo Thyrasec
Thyrasec is leading the charge in securing wireless connected devices with cutting-edge testing and solutions to protect next generation products from evolving wireless cybersecurity threats.
Thyrasec
  • Home
  • Blog
  • About
  • Contact
Services
  • Bluetooth Security
  • Penetration Testing
  • Medical Device Security
  • Reverse Engineering
Subscribe
/* real people should not fill this in and expect good things - do not remove this or risk form bot signups */
Copyright © 2023-2025 Thyrasec LLC. All Rights Reserved
Terms of ServicePrivacy Policy
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}