Medical Exploitation: You Are Now Diabetic

Posted by Faisal Tameesh on February 14, 2019Link 

Glucometer 2

A few months ago, our CTO and hacker-in-chief, Jake Reynolds, bought a glucometer online along with all the necessary stuff to make it work. He thought it would make for an interesting project, as researching this device and its related infrastructure could help improve security in a worthwhile field: health / medical devices. During a slower week at the office, I...Continue reading 

Multi-Fail Authentication: You might be doing MFA Wrong

Posted by Ryan Preston on February 11, 2019Link 


How hackers are getting a foothold in Spring2019! You've probably seen one or two of those 'Top X ways I Hacked You' lists by now. You've read that it's easy enough to guess a weak password given a list of accounts pilfered from the internetz. So, what does everyone suggest? 2FA or Multi-Factor FTW! This is great, and...Continue reading 

Introducing Armory: External Pentesting Like a Boss

Posted by Dan Lawson on February 04, 2019Link 

TLDR; We are introducing Armory, a tool that adds a database backend to dozens of popular external and discovery tools. This allows you to run the tools directly from Armory, automatically ingest the results back into the database and use the new data to supply targets for other tools.   Why?   Over the past few years I’ve spent...Continue reading 

Have Questions?
Get Answers