IoTSec Pulse
Home
Resources
Submit
Sign In
Home
Resources
Book
From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research
View on Amazon
Explore Awesome IoT Security Insights
One-stop hub for IoT security insights, analyses, tools and more.
Search Help
Query Filter Values
Built with
Dirstarter
© 2025 IoTSec Pulse. All rights reserved.
Privacy Policy
Terms of Service
Sitemap
2025-07-22
CVE-2024-10441
slides
Disguise delimit: Exploiting Synology NAS with Delimiters and Novel Tricks
Synology
NAS
2025-07-22
CVE-2024-10441
whitepaper
Disguise delimit: Exploiting Synology NAS with Delimiters and Novel Tricks
Synology
NAS
2025-07-22
2025-07-01
slides
emulation
From Zero to QEMU: A journey into system emulation
Other
Virtualization
2025-07-01
2025-06-26
CVE-2024-51977
CVE-2024-51978
CVE-2024-51979
CVE-2024-51980
CVE-2024-51981
CVE-2024-51982
CVE-2024-51983
CVE-2024-51984
whitepaper
authentication bypass
Print Scan Hacks: Identifying multiple vulnerabilities across multiple Brother devices
Brother
FUJIFILM
Ricoh
Konica Minolta
Toshiba
Printer
2025-06-26
2025-06-11
CVE-2025-3028
slides
How to Find Vulnerabilities in Web Browsers: An Introduction to Web Browser Security Research
Mozilla
Browser
2025-06-11
2025-06-02
academic paper
emulation
Challenges and Pitfalls while Emulating Six Current Icelandic Household Routers
Other
Router
2025-06-02
2025-06-01
slides
hardware
fault injection
EL3vated Privileges: Glitching Google WiFi Pro from Root to EL3
Google
Router
2025-06-01
2025-05-31
slides
IVI
reverse engineering
Hardware Hacking a Car's Head Unit & Uncovering a Vulnerable RTOS
Kia
Automotive
2025-05-31
2025-05-29
CVE-2023-21988
CVE-2024-21114
slides
Pwn2Own
Journey to freedom: Escaping from VirtualBox and Unchaining Objects in the Windows Kernel
Oracle
Virtualization
2025-05-29
2025-05-19
slides
authentication bypass
When ASUS IoT Devices Play Hide-and-Seek with Security: A Vulnerability Adventure
ASUS
Router
2025-05-19
2025-04-04
CVE-2024-38077
slides
One Bug to Rule Them All: Stably Exploiting a Preauth RCE Vulnerability on Windows Server 2025
Microsoft
Operating System
2025-04-04
2025-04-01
CVE-2023-2868
CVE-2023-3519
CVE-2024-3400
CVE-2023-27997
slides
企业设备安全设备漏洞分析与利用
Citrix
Fortinet
Barracuda
Palo Alto Networks
Firewall
VPN
Gateway
2025-04-01
2025-03-07
CVE-2020-14472
CVE-2020-14473
slides
Vigor2960 Memoirs——Pursuit of the Elusive 0day & 1day
DrayTek
Router
2025-03-07
2025-02-21
CVE-2024-25076
CVE-2024-25077
slides
Bootrom
DaBootzone: Breaking the DA1469x BootROM
Renesas
Chip
2025-02-21
slides
firmware
Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware to Enable Vulnerability Research
SonicWall
Firewall
2025-02-21
2025-01-20
slides
Pwn2Own
Exploiting a Blind Format String Vulnerability in Modern Binaries: A Case Study from Pwn2Own Ireland 2024
Synology
Camera
2025-01-20
2024-12-30
slides
fault injection
From fault injection to RCE: Analyzing a Bluetooth tracker
Chipolo
Other
2024-12-30
2024-12-12
CVE-2024-4577
CVE-2024-49026
slides
BestFit Unveiling Hidden Transformers in Windows ANSI!
Other
Other
2024-12-12
CVE-2024-45722
CVE-2024-52324
CVE-2024-47146
slides
firmware
MQTT
The Insecure IoT Cloud Strikes Again: RCE on all Ruijie Cloud-Connected Devices
Ruijie Networks
Application
2024-12-12
2024-12-11
CVE-2024-41592
CVE-2024-41585
slides
When (Remote) Shells Fall Into The Same Hole: Rooting DrayTek Routers Before Attackers Can Do It Again
DrayTek
Router
2024-12-11