Archive

The Birth and Death of “LoopyTicket” – Our Story on CVE-2025-33073

June 27, 2025 Sometimes the best discoveries happen when you’re not even looking for them.

This Caller Does Not Exist: Using AI to Conduct Vishing Attacks

April 8, 2025 As technology advances, attackers are quick to adapt, using cutting-edge innovations to craft social engineering attacks that exploit the one vulnerability no system can fully guard agai…

Building a Hardware Hacking Arsenal: The Right Bits for Every Byte

September 5, 2024 In our last IoT blog post we dove headfirst into IoT Security Assessments with a crash course in the methodology used on a day-to-day basis.