Research Blog
Bleiben Sie mit den neuesten Sicherheitshinweisen, Schwachstellenberichten und Plattformentwicklungen auf dem Laufenden — damit Ihre Produkte sicher und konform sind.
Ausgewählte Research-Artikel
Alle Research-Artikel

Unblob 2024 Highlights: Sandboxing, Reporting, and Community Milestones
Explore the latest developments in Unblob, including enhanced sandboxing with Landlock, improved carving reporting, and χ² randomness analysis. Celebrate community contributions, academic research collaborations, and new format handlers, while looking forward to exciting updates in 2025.
%201.avif)
Critical Vulnerabilities in EV Charging Stations: Analysis of eCharge Controllers
Discover how severe security flaws, including unauthenticated remote command execution (CVE-2024-11665 & CVE-2024-11666), affect eCharge EV charging controllers. Learn about insecure firmware practices, cloud infrastructure issues, and actionable steps to mitigate risks in EV charging systems.

Security Advisory: Arbitrary Command Execution on TP-Link Archer C5400X
Explore ONEKEY Research Lab's security advisory detailing a critical vulnerability in the TP-Link Archer C5400X router. Learn about the risks and recommended actions.

Security Advisory: Remote Code Execution in Delta Electronics DVW Devices
Discover critical vulnerabilities in Delta Electronics' DVW routers, including command injections and buffer overflows, enabling remote code execution.

Binary Static Analysis - The Final Frontier
Uncover ONEKEY's new Binary Zero-Day Identification feature, designed to identify vulnerabilities in executable binaries. Click now to find out more.

Latest Developments in Unblob (3)
Discover the latest developments in UNBLOB. Explore FileSystem Sandboxing, UI enhancements, and advanced Pattern Identification in our latest blog post

Security Advisory: Clock Fault Injection on Mocor OS - Password Bypass
Discover the critical vulnerabilty in the Mocor OS on UNISOC SC6531E devices that allows unauthorised users to bypass locks via clock fault injection.
Schauen Sie sich Whitepapers an
Lesen Sie ausführliche Whitepapers zu Cybersicherheit und Compliance, die darauf ausgelegt sind, die Sicherheit und Compliance Ihres Produkts zu verbessern.
Bereit zur automatisierung ihrer Cybersicherheit & Compliance?
Machen Sie Cybersicherheit und Compliance mit ONEKEY effizient und effektiv.