Say Friend and Enter: Digitally lockpicking an advanced smart lock (Part 1: functional analysis)
BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution
How to Detect a GIFshell Attack: Step-by-Step Guide
TunnelVision (CVE-2024-3661): How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak
Reverse engineering my cable modem and turning it into an SDR