Onekey resources
Access the latest Whitepaper, Datasheets, research, and security advisories on cybersecurity and compliance—all in one place.
Featured resources
All resources

Swisscom
How Swisscom saves USD400,000 per avoided IOT security incident through automated firmware analysis

ESCAR Europe 2024: THE WORLD'S LEADING AUTOMOTIVE CYBER SECURITY CONFERENCE!
ONEKEY at escar - The World's Leading Automotive Cyber Security Conference 2024 – Elevate Your Automotive Cybersecurity!

ONEKEY 360° Comprehensive Product Cybersecurity & Compliance
This whitepaper targets, Head of Product Cybersecurity, Product Owner, Compliance Professionals and Head of Devel- opment of manufacturers of connected devices.

The X in XFTP Stands For eXecute
Find out how our platform enhances firmware security by identifying vulnerabilities & bugs in ICT products, ensuring compliance with DORA & NIS2 directive.

Security Advisory: Arbitrary Command Execution on TP-Link Archer C5400X
Explore ONEKEY Research Lab's security advisory detailing a critical vulnerability in the TP-Link Archer C5400X router. Learn about the risks and recommended actions.

Security Advisory: Remote Code Execution in Ligowave Devices
Explore the security advisory detailing remote code execution vulnerabilities in Ligowave devices. Learn about the risks & recommended protections.

Security Advisory: Remote Code Execution in Delta Electronics DVW Devices
Discover critical vulnerabilities in Delta Electronics' DVW routers, including command injections and buffer overflows, enabling remote code execution.
Ready to automate your Product Cybersecurity & Compliance?
Make cybersecurity and compliance efficient and effective with ONEKEY.