Cybervelia
Subscribe
Sign in
Home
Organization
About
Latest
Top
An In-depth research-based walk-through of an Uninitialized Local Variable Static Analyzer
Do you think the battle with ULVs is over? Think again.
Jun 2
•
Theodoros Danos
Share this post
Cybervelia
An In-depth research-based walk-through of an Uninitialized Local Variable Static Analyzer
Copy link
Facebook
Email
Notes
More
May 2025
Technical Analysis - A Compromise of a Bluetooth Smart Lock
This article details the successful compromise of a commercially available Bluetooth-enabled smart lock supporting fingerprint and wireless unlocking.
May 14
•
Theodoros Danos
Share this post
Cybervelia
Technical Analysis - A Compromise of a Bluetooth Smart Lock
Copy link
Facebook
Email
Notes
More
Reverse Engineering Helium Miner's BLE Comms
This article walks through reverse engineering the Helium Hotspot app to set up a fake (rogue) BLE device that looks like a real hotspot.
May 14
•
Theodoros Danos
Share this post
Cybervelia
Reverse Engineering Helium Miner's BLE Comms
Copy link
Facebook
Email
Notes
More
August 2023
Google Cloud Functions are Secure, only if you know how to use them!
Google Cloud Functions are improperly configured, leading to access control vulnerabilities
Aug 29, 2023
•
Theodoros Danos
Share this post
Cybervelia
Google Cloud Functions are Secure, only if you know how to use them!
Copy link
Facebook
Email
Notes
More
Norec Attack: Stripping BLE encryption from Nordic’s Library (CVE-2020–15509)
How I was able to disable BLE encryption without a blink
Aug 29, 2023
•
Theodoros Danos
Share this post
Cybervelia
Norec Attack: Stripping BLE encryption from Nordic’s Library (CVE-2020–15509)
Copy link
Facebook
Email
Notes
More
Common Developer Pitfalls: A Guide to Bolstering Security
“Breaking their Defense” Series
Aug 9, 2023
•
Theodoros Danos
Share this post
Cybervelia
Common Developer Pitfalls: A Guide to Bolstering Security
Copy link
Facebook
Email
Notes
More
Breaking their Defense - Hacking Stories
An Eye-Opening Journey Through Eliminating Enterprise-Level Defenses
Aug 5, 2023
•
Theodoros Danos
Share this post
Cybervelia
Breaking their Defense - Hacking Stories
Copy link
Facebook
Email
Notes
More
May 2023
Graphicator Tool!
Release of our new GraphQL tool named Graphicator
May 21, 2023
•
Theodoros Danos
Share this post
Cybervelia
Graphicator Tool!
Copy link
Facebook
Email
Notes
More
Attack Surface Intelligence? 5 tools to boost your results!
If you are working as a penetration tester, you must be aware of the 5 tools so you can enhance your results.
May 17, 2023
•
Theodoros Danos
Share this post
Cybervelia
Attack Surface Intelligence? 5 tools to boost your results!
Copy link
Facebook
Email
Notes
More
Do you develop an IoT product? Read the Top 10 vulnerabilities you should be aware!
If you are an indi-developer, a hardware company or a software company, you must be protected against the following vulnerabilities.
May 17, 2023
•
Theodoros Danos
Share this post
Cybervelia
Do you develop an IoT product? Read the Top 10 vulnerabilities you should be aware!
Copy link
Facebook
Email
Notes
More
How skillful are you in BLE Security?
This is a question for all of you reading this article: How good are your skills at pen-testing BLE devices?
May 17, 2023
•
Theodoros Danos
Share this post
Cybervelia
How skillful are you in BLE Security?
Copy link
Facebook
Email
Notes
More
Where most IoT products fail?
The Sacrifice of the Queen
May 17, 2023
•
Theodoros Danos
Share this post
Cybervelia
Where most IoT products fail?
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts