eShard
banner
eshard.bsky.social
eShard
@eshard.bsky.social
Beyond testing tools, solutions that deliver expertise.
🌐 Chip & binary security testing
www.eshard.com
eShard is proud to join the SPARTAQUS project with Bundeswehr University Munich under the German government "SCA4PQC" program.

Over the next 4 years, we’ll push state of the art tooling and #PQC security testing expertise to evaluate real world implementations for side-channel leakage.
January 30, 2026 at 4:24 PM
We’re hiring at eShard ✨
🔗 eshard.com/careers
January 29, 2026 at 12:48 PM
We helped #DEKRA set up their new SoC cybersecurity lab, integrating our tools and tightening the workflow so SCA and EMFI tests are repeatable from day one.

🔗 How we did it: eshard.com/posts/dekra-...

#hardware #cybersecurity #hardwarehacking
January 28, 2026 at 3:13 PM
🆕 iOS emulator update: we now have an #AI assistant to support your iOS security investigations.

What do you think? 💬
Our shortlist is still ongoing: u.eshard.com/ios-emulation #ios #software #cybersecurity
January 20, 2026 at 12:54 PM
Our first webinar of the year is done. Thanks to everyone who joined!

▶ Up next: 𝗔𝗱𝘃𝗮𝗻𝗰𝗲𝗱 𝗛𝗮𝗿𝗱𝘄𝗮𝗿𝗲 𝗛𝗮𝗰𝗸𝗶𝗻𝗴 - 𝗠𝗼𝗱𝗲𝗿𝗻 𝗧𝗲𝗰𝗵𝗻𝗶𝗾𝘂𝗲𝘀

Stay tuned, more details coming soon.
#webinar #hardware #cybersecurity
January 15, 2026 at 5:17 PM
It's this week 🔥 Register now to not miss out!
#Webinar | Kicking off the year with hands-on fault injection on modern devices.

We will look at recent attacks on MCUs, MPUs, and FPGAs, and how FI countermeasures can be validated early in development.

🌏Session 1: u.eshard.com/m8ahb
🌎Session 2: u.eshard.com/TjdEa
January 13, 2026 at 3:01 PM
#Webinar | Kicking off the year with hands-on fault injection on modern devices.

We will look at recent attacks on MCUs, MPUs, and FPGAs, and how FI countermeasures can be validated early in development.

🌏Session 1: u.eshard.com/m8ahb
🌎Session 2: u.eshard.com/TjdEa
January 5, 2026 at 3:33 PM
We wish everyone happy holidays! 💙
December 23, 2025 at 2:59 PM
Update on the iOS emulator 🔥

We’ve been deep into acceleration work lately, and the performance is already very promising for an emulated iOS18.

Still cooking, but we’re getting close to sharing it with you. And more is coming with iOS26...

#ios #emulation #devsecops
December 18, 2025 at 10:54 AM
We're at the AMD Security Working Group in Munich, Germany. 📍

#hardware #cybersecurity #pqc
December 9, 2025 at 2:52 PM
We're on our way to Germany for the @AMD Security Working Group.

We'll be showcasing a demo of a side channel attack targeting ML-KEM on an STM32, and how we approach hardware investigations.

#cybersecurity #hardware #postquantumcryptography
December 8, 2025 at 10:10 AM
We're live! 🔴 Come watch us: youtu.be/nzar2L4GUJ8
Binary Ninja Live Stream: Analyzing TTD traces in BN with esReverse
YouTube video by VECTOR 35
youtu.be
December 5, 2025 at 3:14 PM
🔴 We're going live with Binary Ninja, at 10am EST (3pm GMT / 4pm CET / 11pm SGT). Join us here: www.youtube.com/live/nzar2L4...

#cybersecurity #reverseengineering #binary #softwareengineering
Binary Ninja Live Stream: Analyzing TTD traces in BN with esReverse
YouTube video by VECTOR 35
www.youtube.com
December 5, 2025 at 9:19 AM
Our Keccak webinar is a wrap! 🔵 Thank you to everyone who joined.

Ready for the next one? Tell us what you want to see next and we will make it happen. 😉 #cybersecurity
December 4, 2025 at 5:30 PM
It’s this week 🔵 Join us for a deep dive into Keccak and the side-channel angles behind its applications.

Register below ⬇
Session 1: u.eshard.com/wcUfh
Session 2: u.eshard.com/4hGSQ

#webinar #pqc #postquantum #nist
December 1, 2025 at 1:24 PM
KMAC is one of the main ways Keccak is used in modern systems, which is why we’re exploring it through a practical use case in our next webinar.

Choose your timeslot and register below ⬇
Session 1: u.eshard.com/wcUfh
Session 2: u.eshard.com/4hGSQ
#pqc #nist
November 27, 2025 at 1:31 PM
eShard and PQShield teamed up to put an ML-KEM hardware implementation through a real side-channel evaluation.

Take a look at what we found ➡️ eshard.com/posts/pqshie... #pqc #postquantum #nist #hardware
November 26, 2025 at 2:59 PM
A short teaser of what we’ll cover in our Keccak webinar.
We’ll walk through this KMAC256 state-recovery workflow step by step during the session.

Secure your spot 🚨
𝟭𝟬 𝗔𝗠 𝘀𝗲𝘀𝘀𝗶𝗼𝗻 (4am EST | 5pm SGT): u.eshard.com/wcUfh
𝟱 𝗣𝗠 𝘀𝗲𝘀𝘀𝗶𝗼𝗻 (4am EST | 5pm SGT): u.eshard.com/4hGSQ

#pqc #postquantum #nist
November 25, 2025 at 4:12 PM
Did you know?
Keccak is everywhere, quietly protecting real systems, such as:
• Connected devices checking data integrity
• Firmware updates verifying authenticity
• Embedded products securing messages
• PQC standards like ML-KEM, ML-DSA, and SLH-DSA
November 21, 2025 at 1:32 PM
We're at Hardwear-io in the Netherlands 👋 #cybersecurity
November 21, 2025 at 11:02 AM
We're in Tokyo presenting our iOS emulator at the CODE BLUE Conference.

📲 You can still join our early adopter program: u.eshard.com/ios-emulation #events #cybersecurity
November 18, 2025 at 10:57 AM
Reposted by eShard
Keccak powers SHA-3, KMAC and many post-quantum algorithms, but how does it behave under side-channel analysis?

🔗 Register here: u.eshard.com/wcUfh
Second session: u.eshard.com/4hGSQ
#webinar #pqc #nistsecurity
November 3, 2025 at 5:20 PM
D-7 for the Hardwear.io Netherlands 🔥

We're bringing our glitching fault injection demo to show how a tiny electrical glitch can change the full behavior of a chip. See you there!

#cybersecurity #events
November 13, 2025 at 5:47 PM
We’ve updated our Post-Quantum Cryptography catalog of knowledge and attacks.

✅Updated SCA and FI research on Kyber
✅Improved CPA on Kyber
🆕SASCA on Kyber targeting NTT
🆕Chosen ciphertext attack on Keccak in Kyber
🆕CPA on Dilithium

Request the full list of notebooks: www.eshard.com/contact #pqc
November 13, 2025 at 12:40 PM
Next week we’ll be at Code Blue in Japan. 🎌

Come join our #CTF, AngryPangolin, for a chance to win a Binary Ninja license or a Flipper Zero.

#reverseengineering #ios #softwaresecurity
November 12, 2025 at 10:30 AM