Presentation on the vulnerability research conducted on VirtualBox for Pwn2Own Vancouver 2024.
Read moreCan an attacker recover the data from a stolen computer? Does your last IOT device could compromise your security? Specialized in offensive security we can help you answer these questions. With an in-depth look at your systems and by replicating the steps taken by attackers we allow you to ensure that you are protected from threats.
Ensure that data present on your computers are securely stored and cannot be retrieved from a stolen laptop.
Find real vulnerabilities and weaknesses in your software which could be used by an attacker for compromising your security.
Make sure that your embedded devices are secure and will not allow an attacker to gain access to your network.
Presentation on the vulnerability research conducted on VirtualBox for Pwn2Own Vancouver 2024.
Read moreA short talk about hacking Western Digital NAS for Pwn2Own Austin 2021.
Read more