Cybervelia
Subscribe
Sign in
Home
Organization
About
New
Top
Google Cloud Functions are Secure, only if you know how to use them!
Google Cloud Functions are improperly configured, leading to access control vulnerabilities
Aug 29
•
Theodoros Danos
Share this post
Google Cloud Functions are Secure, only if you know how to use them!
blog.cybervelia.com
Copy link
Facebook
Email
Note
Other
Norec Attack: Stripping BLE encryption from Nordic’s Library (CVE-2020–15509)
How I was able to disable BLE encryption without a blink
Aug 29
•
Theodoros Danos
Share this post
Norec Attack: Stripping BLE encryption from Nordic’s Library (CVE-2020–15509)
blog.cybervelia.com
Copy link
Facebook
Email
Note
Other
Common Developer Pitfalls: A Guide to Bolstering Security
“Breaking their Defense” Series
Aug 9
•
Theodoros Danos
Share this post
Common Developer Pitfalls: A Guide to Bolstering Security
blog.cybervelia.com
Copy link
Facebook
Email
Note
Other
Breaking their Defense - Hacking Stories
An Eye-Opening Journey Through Eliminating Enterprise-Level Defenses
Aug 5
•
Theodoros Danos
Share this post
Breaking their Defense - Hacking Stories
blog.cybervelia.com
Copy link
Facebook
Email
Note
Other
May 2023
Graphicator Tool!
Release of our new GraphQL tool named Graphicator
May 21
•
Theodoros Danos
Share this post
Graphicator Tool!
blog.cybervelia.com
Copy link
Facebook
Email
Note
Other
Attack Surface Intelligence? 5 tools to boost your results!
If you are working as a penetration tester, you must be aware of the 5 tools so you can enhance your results. The attack vector to which companies are…
May 17
•
Theodoros Danos
Share this post
Attack Surface Intelligence? 5 tools to boost your results!
blog.cybervelia.com
Copy link
Facebook
Email
Note
Other
Do you develop an IoT product? Read the Top 10 vulnerabilities you should be aware!
If you are an indi-developer, a hardware company or a software company, you must be protected against the following vulnerabilities. The following are…
May 17
•
Theodoros Danos
Share this post
Do you develop an IoT product? Read the Top 10 vulnerabilities you should be aware!
blog.cybervelia.com
Copy link
Facebook
Email
Note
Other
How skillful are you in BLE Security?
This is a question for all of you reading this article: How good are your skills at pen-testing BLE devices? There are hundred of companies that excel…
May 17
•
Theodoros Danos
Share this post
How skillful are you in BLE Security?
blog.cybervelia.com
Copy link
Facebook
Email
Note
Other
Where most IoT products fail?
The Sacrifice of the Queen Most of the IoT products are very small in size, and some of them may not have an interface at all – maybe just a push…
May 17
•
Theodoros Danos
Share this post
Where most IoT products fail?
blog.cybervelia.com
Copy link
Facebook
Email
Note
Other
Mobile Bug Bounty Hunting? Enter BLE
An overview of BLE Security Vector and Bug Bounty Hunting
May 17
•
Theodoros Danos
Share this post
Mobile Bug Bounty Hunting? Enter BLE
blog.cybervelia.com
Copy link
Facebook
Email
Note
Other
Hacking Smartwatches for Spear Phishing
In this article we explain how to hack into a SmartWatch and show a custom text message
May 17
•
Theodoros Danos
Share this post
Hacking Smartwatches for Spear Phishing
blog.cybervelia.com
Copy link
Facebook
Email
Note
Other
Testing a mobile app using a device you don’t have
We will go through a BLE Bulb Application and try to make the BLE communication happen without having the actual bulb in our hands
May 17
•
Theodoros Danos
Share this post
Testing a mobile app using a device you don’t have
blog.cybervelia.com
Copy link
Facebook
Email
Note
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts