April 2022

A man writing code in his office

No Hardware, No Problem: Emulation and Exploitation

Vulnerability Hunting for Sport If you’ve been following our blog, you might notice some favoritism when it comes to embedded targets… We’ve been exploring the NETGEAR R7000 for several blog posts. This pattern stems from a number of product characteristics, one of which is that the device is easy to emulate in QEMU, which provides an alternative to testing the […]

No Hardware, No Problem: Emulation and Exploitation Read More »

Cyber-physical ranges built by GRIMM experts are used to demonstrate attacks on critical infrastructure in real-time.

Connecting the Dots for Connected Security

By: Naki Carter It is undeniable that organizations, government agencies, and critical infrastructure providers face evolving cyber threats with increased volume and complexity. Securing your organization’s information and assets requires the right amount of effort focused on appropriate areas. Cyber-Physical Systems Security According to the National Institute for Standards and Technology (NIST), “Cyber-Physical Systems (CPS)

Connecting the Dots for Connected Security Read More »