About:
Denis Laskov is a cybersecurity expert and executive with a passion for technology and digital transformation.
Website:
Specializations:
Interests:
Subscribe to RSS:
Researchers bypassed STM32G0 microcontroller protections to extract flash memory, demonstrating a novel approach to overcoming advanced security features.
NMFTA's white paper uncovers a serious wireless vulnerability in trailer brake controllers, exposing them to potential unauthorized control and security risks.
The analysis reveals vulnerabilities in RF sensors, demonstrating their potential to leak sensitive data and serve as attack vectors in various applications.
A new EMFI attack on the nRF54L15 SoC showcases vulnerabilities in its glitch detection mechanism through precise electromagnetic manipulation.
Researchers successfully demonstrated how to break the Secure Boot chain of the ESP32 V3 chip using fault injection and automation techniques.
The post explores real-world physical attacks on Autonomous Driving Systems, revealing vulnerabilities and methods like laser pointers and drones that can mislead these technologies.
A new vulnerability in the Moxa UC-1222A Linux device allows attackers to extract LUKS encryption keys through SPI pins, marking a notable advancement in security research.
The first public security analysis of Tile's Bluetooth tracking system uncovers significant vulnerabilities that could compromise user privacy and enable indefinite tracking of devices.
This research highlights the cybersecurity risks associated with drones, categorizing threats and discussing common attack techniques and defenses in the low-altitude economy.
LLM-generated proof-of-concept exploits often simulate success without actual execution, leading to a high rate of invalid results in cybersecurity testing.
This post provides an in-depth review of automotive battery pack design, essential for EV cybersecurity experts and enthusiasts.
An AI-based fuzzer using GPT-4 effectively analyzed the Matter protocol's documentation, uncovering 147 bugs, including 61 zero-days, enhancing IoT security.
The post outlines techniques to bypass Windows security features on stolen laptops, highlighting vulnerabilities in TPM-only BitLocker setups.
A study reveals critical security vulnerabilities in vehicle diagnostic systems, highlighting the ease of brute-force attacks on ECUs through OBD ports.
Telecom fiber-optic cables can be manipulated to eavesdrop on conversations, with AI capable of reconstructing speech from 50 meters away.
Anna Antonenko uncovers a hidden backdoor in the Yamaha PSR-E433 synthesizer, enabling remote code execution through specially crafted MIDI messages.
Researchers reveal a method to wirelessly hack EV charging systems, demonstrating a man-in-the-middle attack on a Polestar 2 vehicle using a novel SDR implementation.
AI tools identified 38 vulnerabilities in consumer robots, highlighting significant security risks in devices like lawnmowers and window-cleaning robots.
The paper provides insights into the Military Internet of Things, detailing its architecture and challenges while offering valuable information for security professionals and hackers.
A study reveals that 70% of popular automotive companion apps have serious security vulnerabilities, risking unauthorized access and manipulation of vehicle functions.
Xeno Kovah demonstrates how he reverse-engineered a $5 Realtek Bluetooth dongle into a powerful tool for security research by overcoming significant technical limitations.
QR codes are far more effective than USB dropping attacks, with a 680.91% scan rate compared to just 8.51% for USBs, emphasizing security vulnerabilities.
A Spanish engineer demonstrated a serious security flaw in DJI's MQTT broker, enabling control over 7,000 vacuum cleaners and exposing sensitive data.
Three insightful blog posts on glitching and fault injection techniques for Renesas automotive microcontrollers are shared, catering to car hacking enthusiasts.