Looking at the Attack Surfaces of the Sony XAV-AX8500 January 09, 2025 / Connor Ford 0 Likes categories / Blog post tags / Sony, Automotive, Attack Surface
ZDI Threat Hunting 2024: Highlights, Trends, & Challenges January 08, 2025 / Peter Girnus 0 Likes categories / Blog post tags / Threat Hunting, Retrospective
Detailing the Attack Surfaces of the Tesla Wall Connector EV Charger December 17, 2024 / Dmitry Janushkevich 0 Likes categories / Blog post tags / Tesla, EV, Automotive
SolarWinds Access Rights Manager: One Vulnerability to LPE Them All December 12, 2024 / Piotr Bazydło 0 Likes categories / Blog post tags / SolarWinds, Research, LPE
The December 2024 Security Update Review December 10, 2024 / Dustin Childs 0 Likes categories / Blog post tags / Adobe, Microsoft, Security Patch
Detailing the Attack Surfaces of the WolfBox E40 EV Charger December 03, 2024 / Dmitry Janushkevich 0 Likes categories / Blog post tags / EV Charger, WolfBox, Automotive
Looking at the Attack Surfaces of the Kenwood DMX958XR IVI November 21, 2024 / Connor Ford 0 Likes categories / Blog post tags / Kenwood, IVI, Automotive
Looking at the Internals of the Kenwood DMX958XR IVI November 19, 2024 / Connor Ford 0 Likes categories / Blog post tags / Automotive, IVI, Kenwood
The November 2024 Security Update Review November 12, 2024 / Dustin Childs 0 Likes categories / Blog post tags / Security Patch, Adobe, Microsoft
Multiple Vulnerabilities in the Mazda In-Vehicle Infotainment (IVI) System November 07, 2024 / Dmitry Janushkevich 0 Likes categories / Blog post tags / Visteon, Automotive, IVI