By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.
In this post, we'll explore Docker Scout's strengths and weaknesses as an SBOM/SCA tool and compare vulnerability results before and after runtime analysis.
How to Test Embedded Systems Security Easily with Mayhem
In this blog post, we will demonstrate how Mayhem can be used to easily set up fuzzing campaigns in embedded systems, using IoTGoat’s dnsmasq as an example.
Finding FireWire (IEEE 1394) Vulnerabilities: CVE-2023-3159 and CVE-2024-27401
Testing low-level code such as IEEE 1394 (FireWire) can be a challenge. The solution lies in extracting kernel functions and testing them like unit tests.
CVE-2024-28578: Test Third-Party Image Libraries With Mayhem
Learn how to test third-party image libraries with Mayhem, using CVE-2024-28578 - an exploitable vulnerability in the FreeImage library - as an example.
Building a Time Machine: Testing Debian Packages Across Time
In this blog post, we’re going to attempt to use Debian and its packages to build a mini time machine and investigate the vulnerability of packages across time.
In this blog, we’ll do a quick comparison of CAN vs. Ethernet and go over some of the strengths and weaknesses of both in the context of automotive systems.