Research Blog
Bleiben Sie mit den neuesten Sicherheitshinweisen, Schwachstellenberichten und Plattformentwicklungen auf dem Laufenden — damit Ihre Produkte sicher und konform sind.
Ausgewählte Forschungsartikel
Alle Forschungsartikel
Security Advisory: Unauthenticated Command Injection in Mitel IP Phones
Discover critical vulnerabilities in Mitel SIP phones that allow unauthenticated command injection. Learn how outdated input parsing can expose your devices and why it's essential to scan firmware for security risks. Protect your network with our in-depth analysis and expert takeaways.
The X in XFTP Stands For eXecute
Find out how our platform enhances firmware security by identifying vulnerabilities & bugs in ICT products, ensuring compliance with DORA & NIS2 directive.
Security Advisory: Arbitrary Command Execution on TP-Link Archer C5400X
Explore ONEKEY Research Lab's security advisory detailing a critical vulnerability in the TP-Link Archer C5400X router. Learn about the risks and recommended actions.
Security Advisory: Remote Code Execution in Ligowave Devices
Explore the security advisory detailing remote code execution vulnerabilities in Ligowave devices. Learn about the risks & recommended protections.
Security Advisory: Remote Code Execution in Delta Electronics DVW Devices
Discover critical vulnerabilities in Delta Electronics' DVW routers, including command injections and buffer overflows, enabling remote code execution.
Spotting Silent Patches in OSS with Binary Static Analysis
Uncover silent patches in OSS with our binary static analysis. Understand the role of in-depth vulnerability management beyond CVE tracking.
Security Advisory: Remote Command Execution in Cisco Access Point WAP Products
Learn about the vulnerabilities affecting Cisco's WAP371 and other Small Business Wireless APs, and the importance of binary static analysis.
Schauen Sie sich Whitepapers an
Lesen Sie ausführliche Whitepapers zu Cybersicherheit und Compliance, die darauf ausgelegt sind, die Sicherheit und Compliance Ihres Produkts zu verbessern.
Bereit zur automatisierung ihrer Cybersicherheit & Compliance?
Machen Sie Cybersicherheit und Compliance mit ONEKEY effizient und effektiv.