Research Blog
Bleiben Sie mit den neuesten Sicherheitshinweisen, Schwachstellenberichten und Plattformentwicklungen auf dem Laufenden — damit Ihre Produkte sicher und konform sind.
Ausgewählte Research-Artikel
Alle Research-Artikel

Security Advisory: Unauthenticated Remote Command Execution in Multiple WAGO Products
Security Advisory: Critical unauthenticated command injection vulnerability in the "Legal Information" plugin of the WAGO Series PFC100 web interface.

Latest Developments in Unblob (2)
Revolutionize firmware extraction with UNBLOB! Discover the latest developments & advancements in this cutting-edge project. Don't miss latest blog post!

Leveraging ChatGPT to build a Hardware Fault Injection Tool.
This security insight explores the process of building an AI-assisted Teensy-based fault injection framework for testing system security. Learn more here!

Security Advisory: Multiple Vulnerabilities in Phoenix Contact Routers
Authenticated users can execute arbitrary commands with elevated privileges or access any file on the system. Read the latest security advisory here!

Security Advisory: Multiple Vulnerabilities in NetModule Routers
Multiple vulnerabilities identified in NetModule industrial routers. Are your industrial routers safe? Read the latest security advisory now!

ClamAV Critical Patch Review
In this technical deep dive, ONEKEY explores the underlying issues fixed by the recent critical patch released by ClamAV.

Security Advisory: Remote Command Execution in binwalk
Learn about the security vulnerability in binwalk v2.1.2b-2.3.3 that allows malicious PFS file extraction and remote code execution. 👉
Schauen Sie sich Whitepapers an
Lesen Sie ausführliche Whitepapers zu Cybersicherheit und Compliance, die darauf ausgelegt sind, die Sicherheit und Compliance Ihres Produkts zu verbessern.
Bereit zur automatisierung ihrer Cybersicherheit & Compliance?
Machen Sie Cybersicherheit und Compliance mit ONEKEY effizient und effektiv.