Our team pulled off some great hacks:
🖨️ HP Printer — $20K / 2 MoP
🏠 Home Assistant — $15K / 3 MoP
🔌 Smart Plug — $20K / 2 MoP
📸 Canon — $10K / 2 MoP
Total: $65K / 9 MoP
So proud of what we achieved together! 🧠⚡
Our team pulled off some great hacks:
🖨️ HP Printer — $20K / 2 MoP
🏠 Home Assistant — $15K / 3 MoP
🔌 Smart Plug — $20K / 2 MoP
📸 Canon — $10K / 2 MoP
Total: $65K / 9 MoP
So proud of what we achieved together! 🧠⚡
▶️ Read more: neodyme.io/en/blog/wide...
▶️ Read more: neodyme.io/en/blog/wide...
▶️ Read the findings and how we got there: neodyme.io/en/blog/pwn2...
▶️ Read the findings and how we got there: neodyme.io/en/blog/pwn2...
Our colleague Felipe will discuss how partial emulation and DFA can be used to study a legacy version of Widevine L3, Google's software-based DRM.
➡️ Dive into the past to strengthen future DRM security.
🗓️ Oct 23 at 2:15pm
2025.hack.lu/agenda/
Our colleague Felipe will discuss how partial emulation and DFA can be used to study a legacy version of Widevine L3, Google's software-based DRM.
➡️ Dive into the past to strengthen future DRM security.
🗓️ Oct 23 at 2:15pm
2025.hack.lu/agenda/
We break it down with reverse engineering, process tracing, & two exploit strategies. Read Part 1 of our deep dive: 👉 neodyme.io/de/blog/leno...
We break it down with reverse engineering, process tracing, & two exploit strategies. Read Part 1 of our deep dive: 👉 neodyme.io/de/blog/leno...
✅️ Bonus: it even outperforms Google's prototype. 👀
Full write-up here: neodyme.io/en/blog/pqc-...
✅️ Bonus: it even outperforms Google's prototype. 👀
Full write-up here: neodyme.io/en/blog/pqc-...
Great collaboration comes from trust, connection, and a shared good vibe ✨
Great collaboration comes from trust, connection, and a shared good vibe ✨
Our colleagues delivered insightful trainings on crypto hacking and binary exploitation and got amazing feedback from the crowd 🙌
Missed it? We offer tailored security trainings for companies too. Just reach out.
Our colleagues delivered insightful trainings on crypto hacking and binary exploitation and got amazing feedback from the crowd 🙌
Missed it? We offer tailored security trainings for companies too. Just reach out.
🔥 The issue (CVE-2025-6812) - now fixed: A privileged service searched for an OpenSSL config file in an unsecured location, enabling LPE.
➡️ Advisory here: neodyme.io/en/advisorie...
☂️ Patch your systems!
🔥 The issue (CVE-2025-6812) - now fixed: A privileged service searched for an OpenSSL config file in an unsecured location, enabling LPE.
➡️ Advisory here: neodyme.io/en/advisorie...
☂️ Patch your systems!
"Black Hat, White Hat, Cyberwar - Modern Attacks and Defense"
From hacking-as-a-service to cyberwarfare, discover how attacks are evolving and what it means for digital defense.
🕵️♀️ Don't miss it!
"Black Hat, White Hat, Cyberwar - Modern Attacks and Defense"
From hacking-as-a-service to cyberwarfare, discover how attacks are evolving and what it means for digital defense.
🕵️♀️ Don't miss it!
It might be quietly leaking what it was trained on.
In a new blog post, we explain membership inference attacks and why they matter for cyber security experts.
🔗 neodyme.io/en/blog/memb...
It might be quietly leaking what it was trained on.
In a new blog post, we explain membership inference attacks and why they matter for cyber security experts.
🔗 neodyme.io/en/blog/memb...
Check it out here: www.1e9.community/festival-der...
Check it out here: www.1e9.community/festival-der...
We're looking under the hood at the "fuzzcases" Riverguard uses to catch real-world bugs in Solana smart contracts.
Still shocked how often some of these pop up.
Check it out 👉 neodyme.io/en/blog/rive...
We're looking under the hood at the "fuzzcases" Riverguard uses to catch real-world bugs in Solana smart contracts.
Still shocked how often some of these pop up.
Check it out 👉 neodyme.io/en/blog/rive...
A great challenge with a wide range of categories.
The result: 1st place in 🇩🇪 and top 3 in 🇪🇺.
A great challenge with a wide range of categories.
The result: 1st place in 🇩🇪 and top 3 in 🇪🇺.
Starting with a QNAP QHora-322 NAS, we pivoted to the Canon imageCLASS MF656Cdw - and ended up with shellcode execution.
Read the full vulnerability deep dive here 👉 neodyme.io/en/blog/pwn2...
Starting with a QNAP QHora-322 NAS, we pivoted to the Canon imageCLASS MF656Cdw - and ended up with shellcode execution.
Read the full vulnerability deep dive here 👉 neodyme.io/en/blog/pwn2...