Exploiting Embedded Linux Devices Through the JTAG Interface

With the explosion of internet-of-things (IoT) and connected, industrial IoT (IIoT), and connected, smart home devices, it is getting harder and harder to find things that don’t have some sort of embedded ...

Gaining Root Access on Sierra Wireless AirLink Devices

Wi-Fi connectivity is increasingly pervasive. Many organizations have embraced Wi-Fi as a primary means of connecting to network applications and resources. It is significantly cheaper and more convenient than having to run ...

IOActive and Bugcrowd Combine Forces to Extend Security Service Offerings

| | bugcrowd, IOActive
Strategic partnership provides Global 1000 customers with more options to reduce risk and identify security gaps Infosecurity Europe – Olympia, London, June 4, 2019 – IOActive, Inc., the worldwide leader in research-fueled ...
Security Boulevard
Robots Want Bitcoins Too!

Inner Circle Podcast: Episode 004

My guest on the Inner Circle podcast this week is Cesar Cerrudo, CTO of IOActive. Our topic revolves around ransomware–but with a twist that involves robots. I think we can all agree ...