2023 is now over, and we wanted to thank everyone on the Thyrasec team that had …
BLE Attacks and Real World Consequences
The Flipper Zero platform has been a boon for penetration testing. If you don’t know about …
Extracting Firmware from EEPROM, Flash and eMMC
We’ve previously covered some of the best tools for reversing firmware that you should be using, …
Read More from Extracting Firmware from EEPROM, Flash and eMMC
Firmware Reversing and Analysis Tools
Firmware sits at the core of almost every electronic product today. It’s at the heart of …
Bluetooth Security Primer – Classic + BLE
Background Bluetooth is one of the most popular wireless protocols for devices. Maybe the biggest reason …
Top 10 Wireless Security Issues
Wireless systems spread the gamut from narrowband single channel transmitters to multi-gigabit Wi-Fi using OFDMA and …
Wireless Security Challenges
Wireless devices are all around us. We rely on them for everything we do, from opening …
Open vs Closed Source Stack Security
Over the last year, there’s been a few vulnerabilities founds for the Zephyr Bluetooth stack: CVE-2023-5753 …
Thyrasec and Its Mission
As our first post to our blog, we wanted to welcome you to our site. At …