Thyrasec Blog

Guide

A Guide to Bluetooth Man-In-The-Middle (MITM)

One of the more challenging aspects of Bluetooth security is dealing with practical attacks. Man-In-The-Middle attacks …

Read More from A Guide to Bluetooth Man-In-The-Middle (MITM)

Guide

Integrating MbedTLS by Example

Adding MbedTLS to your project is a great way to leverage a library designed to help …

Read More from Integrating MbedTLS by Example

General

Reviewing BLE and Bluetooth Vulnerabilities and Attacks of 2023

We’ve seen a lot of attacks against Bluetooth and BLE over the last few years. Some …

Read More from Reviewing BLE and Bluetooth Vulnerabilities and Attacks of 2023

Vulnerability

Top 6 Bluetooth Vulnerabilities

Over the last few years we’ve seen a slew of vulnerabilities found in Bluetooth and Bluetooth …

Read More from Top 6 Bluetooth Vulnerabilities

General

Medical Device Cybersecurity

Medical device cybersecurity is a critical aspect of healthcare technology, aimed at protecting medical devices and …

Read More from Medical Device Cybersecurity

Guide

Using OpenSSL for Securing Bluetooth and Wireless Devices

In the rapidly evolving world of embedded systems, security has become a paramount concern. With the …

Read More from Using OpenSSL for Securing Bluetooth and Wireless Devices

Guide

Building BlueZ – For Defense and Offense

What’s BlueZ BlueZ is an open-source Bluetooth stack implementation for Linux-based operating systems. The stack implementation …

Read More from Building BlueZ – For Defense and Offense

Vulnerability

Bluetooth Vulnerabilities in Android, MacOS, iOS, Linux let attackers inject data

2024 has barely started, and a researcher has already publicly disclosed several vulnerabilities related to Bluetooth …

Read More from Bluetooth Vulnerabilities in Android, MacOS, iOS, Linux let attackers inject data

General

Happy New Year and Hello 2024

2023 is now over, and we wanted to thank everyone on the Thyrasec team that had …

Read More from Happy New Year and Hello 2024

News

BLE Attacks and Real World Consequences

The Flipper Zero platform has been a boon for penetration testing. If you don’t know about …

Read More from BLE Attacks and Real World Consequences