To use our site, you agree to the use of cookies and data processing according to our privacy statement.
Close
Search

Riscure Blog

In this blog post, Riscure’s security analyst Naasa Fikri and senior trainer/senior security analyst Yashin Mehaboobe illustrate a common approach for a light security assessment of smart home devices with D-Link DIR 2680 router as a target.

14/04/2021
Learn more

In our previous two blog posts, we first introduced Samsung’s TEE OS TEEGRIS and then showed how to exploit a Trusted Application (TA) and gain runtime control.

30/03/2021
Learn more

In this second blog post, we will continue to explore TEEGRIS by reverse engineering TAs in order to identify and exploit vulnerabilities.

15/03/2021
Learn more

The goal of our investigation was to assess how strong Samsung’s TEE security OS is and whether it can be compromised to obtain runtime control and extract all protected assets, allowing, e.g. decryption of user data and possible payment frauds.

23/02/2021
Learn more

Riscure has discovered a serious vulnerability in an affordable ESP32 IoT solution developed by Espressif Systems.

30/10/2019
Learn more

In this article we show an attack on unmodified KeepKey hardware cryptowallet, which uses electro-magnetic fault injection.

30/04/2019
Learn more

We set out to create a proprietary cable that is capable for sniffing all the messages sent through the CAN gateway.

18/09/2018
Learn more