Cybervelia
Subscribe
Sign in
Home
Organization
About
Latest
Top
Google Cloud Functions are Secure, only if you know how to use them!
Google Cloud Functions are improperly configured, leading to access control vulnerabilities
Aug 29, 2023
•
Theodoros Danos
Share this post
Cybervelia
Google Cloud Functions are Secure, only if you know how to use them!
Copy link
Facebook
Email
Notes
More
Norec Attack: Stripping BLE encryption from Nordic’s Library (CVE-2020–15509)
How I was able to disable BLE encryption without a blink
Aug 29, 2023
•
Theodoros Danos
Share this post
Cybervelia
Norec Attack: Stripping BLE encryption from Nordic’s Library (CVE-2020–15509)
Copy link
Facebook
Email
Notes
More
Common Developer Pitfalls: A Guide to Bolstering Security
“Breaking their Defense” Series
Aug 9, 2023
•
Theodoros Danos
Share this post
Cybervelia
Common Developer Pitfalls: A Guide to Bolstering Security
Copy link
Facebook
Email
Notes
More
Breaking their Defense - Hacking Stories
An Eye-Opening Journey Through Eliminating Enterprise-Level Defenses
Aug 5, 2023
•
Theodoros Danos
Share this post
Cybervelia
Breaking their Defense - Hacking Stories
Copy link
Facebook
Email
Notes
More
May 2023
Graphicator Tool!
Release of our new GraphQL tool named Graphicator
May 21, 2023
•
Theodoros Danos
Share this post
Cybervelia
Graphicator Tool!
Copy link
Facebook
Email
Notes
More
Attack Surface Intelligence? 5 tools to boost your results!
If you are working as a penetration tester, you must be aware of the 5 tools so you can enhance your results.
May 17, 2023
•
Theodoros Danos
Share this post
Cybervelia
Attack Surface Intelligence? 5 tools to boost your results!
Copy link
Facebook
Email
Notes
More
Do you develop an IoT product? Read the Top 10 vulnerabilities you should be aware!
If you are an indi-developer, a hardware company or a software company, you must be protected against the following vulnerabilities.
May 17, 2023
•
Theodoros Danos
Share this post
Cybervelia
Do you develop an IoT product? Read the Top 10 vulnerabilities you should be aware!
Copy link
Facebook
Email
Notes
More
How skillful are you in BLE Security?
This is a question for all of you reading this article: How good are your skills at pen-testing BLE devices?
May 17, 2023
•
Theodoros Danos
Share this post
Cybervelia
How skillful are you in BLE Security?
Copy link
Facebook
Email
Notes
More
Where most IoT products fail?
The Sacrifice of the Queen
May 17, 2023
•
Theodoros Danos
Share this post
Cybervelia
Where most IoT products fail?
Copy link
Facebook
Email
Notes
More
Mobile Bug Bounty Hunting? Enter BLE
An overview of BLE Security Vector and Bug Bounty Hunting
May 17, 2023
•
Theodoros Danos
Share this post
Cybervelia
Mobile Bug Bounty Hunting? Enter BLE
Copy link
Facebook
Email
Notes
More
Hacking Smartwatches for Spear Phishing
In this article we explain how to hack into a SmartWatch and show a custom text message
May 17, 2023
•
Theodoros Danos
Share this post
Cybervelia
Hacking Smartwatches for Spear Phishing
Copy link
Facebook
Email
Notes
More
Testing a mobile app using a device you don’t have
We will go through a BLE Bulb Application and try to make the BLE communication happen without having the actual bulb in our hands
May 17, 2023
•
Theodoros Danos
Share this post
Cybervelia
Testing a mobile app using a device you don’t have
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts