Embedded Devices / Internet of Things
Voice over IP (VoIP)
Source Code review
Secure Coding Workshop
Social Engineering Awareness Training
Certifications and Trainings
Penetration Testing Methodology
Conferences and Competitions
Our consultants are constantly publishing new articles and whitepapers derived from their research in the field of IT Security. Some examples of previous publications are:
Abusing GDI for Ring0 Exploit Primitives: Evolution
Look Mom, I don't use Shellcode: Browser Exploitation Case Study for Internet Explorer 11
Exploiting CVE-2014-4113 on Windows 8.1
Hacking Video Conferencing Systems, in Black Hat Europe.
Scanstud: A Methodology for Systematic, Fine-grained Evaluation of Static Analysis Tools, in 2nd International Workshop on Security Testing.
USB Device Drivers: A Stepping Stone into your Kernel, in 6th European Conference on Computer Network Defense.
For detailed information and to view some of the publications visit