In the last blog, we discussed the components that are used in hardware hacking, the discovery phase and how to pull information off a device leveraging a UART port and the Das U-Boot boot loader. However, in some cases we aren’t able to
Our team researches and documents bleeding-edge security concepts and hacking techniques. This blog explores these topics and more to keep you informed.
Introduction to Hardware Hacking: Part 2
By Anthony Ralston | December 02, 2020 | Blog
In the last blog, we discussed the components that are used in hardware hacking, the discovery phase and how to pull information off a device leveraging a UART port and the Das U-Boot boot loader. However, in some cases we aren’t able to
Introduction to Hardware Hacking: Part 1
By Anthony Ralston | November 13, 2020 | Blog
There are many devices out there that store information in different ways and unfortunately, not all of them take security into account. With the advent of the Internet of Things (IoT), device manufacturers are publishing devices faster than ever,
Defining the Secure Software Development Lifecycle (SSDLC)
By Cornel du Preez | June 30, 2020 | Blog
Here at Abricto Security, we believe that application penetration tests only reveal the tip of the iceberg. Specifically, if we conduct an application penetration test and we find that it’s riddled with vulnerabilities, the remediation effort