Reverse Engineering

Radio Killed the Radio Stars: Security Analysis of RF Protocols for Industrial Applications

Radio Killed the Radio Stars: Security Analysis of RF Protocols for Industrial Applications

After having analyzed the several RF protocols for industrial applications, distributed by global vendors, we discovered that none of them had sufficient security features to prevent an attacker from hijacking the communication and manoeuvre the controlled connected machines.

Read More
What we Know About Eyepyramid

What we Know About Eyepyramid

The day before the EyePyramid case exploded, I received a confidential email with a PDF. It was the scanned copy of the court order for the law enforcement to proceed and arrest the Occhionero brothers. In a few minutes, I noticed that this leaked document was also circulating on various private mailing lists and chat groups I’m part of. At some point, I received a non-redacted copy.

Read More