Thyrasec Blog

Guide

Extracting Firmware from EEPROM, Flash and eMMC

We’ve previously covered some of the best tools for reversing firmware that you should be using, …

Read More from Extracting Firmware from EEPROM, Flash and eMMC

Guide

Firmware Reversing and Analysis Tools

Firmware sits at the core of almost every electronic product today. It’s at the heart of …

Read More from Firmware Reversing and Analysis Tools

Guide

Bluetooth Security Primer – Classic + BLE

Background Bluetooth is one of the most popular wireless protocols for devices. Maybe the biggest reason …

Read More from Bluetooth Security Primer – Classic + BLE

Guide

Top 10 Wireless Security Issues

Wireless systems spread the gamut from narrowband single channel transmitters to multi-gigabit Wi-Fi using OFDMA and …

Read More from Top 10 Wireless Security Issues

Guide

Wireless Security Challenges

Wireless devices are all around us. We rely on them for everything we do, from opening …

Read More from Wireless Security Challenges

Guide

Open vs Closed Source Stack Security

Over the last year, there’s been a few vulnerabilities founds for the Zephyr Bluetooth stack: CVE-2023-5753 …

Read More from Open vs Closed Source Stack Security

General

Thyrasec and Its Mission

As our first post to our blog, we wanted to welcome you to our site. At …

Read More from Thyrasec and Its Mission