Research Blog
Stay up to date with the newest security advisories, vulnerability reports, and platform developments—keeping your products secure and compliant.
Featured research articles
All research articles

Security Advisory: Multiple Vulnerabilities in Phoenix Contact Routers
Authenticated users can execute arbitrary commands with elevated privileges or access any file on the system. Read the latest security advisory here!

Security Advisory: Multiple Vulnerabilities in NetModule Routers
Multiple vulnerabilities identified in NetModule industrial routers. Are your industrial routers safe? Read the latest security advisory now!

ClamAV Critical Patch Review
In this technical deep dive, ONEKEY explores the underlying issues fixed by the recent critical patch released by ClamAV. 👉

Security Advisory: Remote Command Execution in binwalk
Learn about the security vulnerability in binwalk v2.1.2b-2.3.3 that allows malicious PFS file extraction and remote code execution. 👉

Security Advisory: Unauthenticated Configuration Export in Multiple WAGO Products
ONEKEY identified an unauthenticated configuration export in industrial controllers from WAGO . Read the latest Security Advisory here 👉

Latest Developments in Unblob
After initial launch of unblob at Blackhat and DEFCON, the project continues to grow and we want to share a few things with you. Read more!

Security Advisory: Asus M25 NAS Vulnerability
ONEKEY identifies a command injection bug in the M25 NAS from Asus. Read the latest Security Advisory here 👉
check out white papers
Explore in-depth whitepapers on cybersecurity and compliance, designed to strengthen your product’s security and compliance.
Ready to automate your Product Cybersecurity & Compliance?
Make cybersecurity and compliance efficient and effective with ONEKEY.