Skip to main content

This site uses cookies – small text files that are placed on your machine to help the site provide a better user experience. In general, cookies are used to retain user preferences, store information for things like shopping carts, and provide anonymised tracking data to third party applications like Google Analytics.

As a rule, cookies will make your browsing experience better. However, you may prefer to disable cookies on this site and on others. The most effective way to do this is to disable cookies in your browser. We suggest consulting the Help section of your browser or taking a look at the About Cookies website which offers guidance for all modern browsers

Further information about what information we collect and how we ue it can be found in our privacy policy.

Taming the dragon: reverse engineering firmware with Ghidra 
  • Hardware Hacking
  • How Tos
  • Reverse Engineering
Taming the dragon: reverse engineering firmware with Ghidra 

14 Min Read

Mar 12, 2026

Breaking Out of Citrix and other Restricted Desktop Environments
  • How Tos
  • Virtual Environments
Breaking Out of Citrix and other Restricted Desktop Environments

25 Min Read

Mar 02, 2026

EV batteries as grid infrastructure and the security risk that follows 
  • Automotive Security
  • Opinions
EV batteries as grid infrastructure and the security risk that follows 

6 Min Read

Feb 24, 2026