Sitemap - 2023 - Cybervelia
Google Cloud Functions are Secure, only if you know how to use them!
Norec Attack: Stripping BLE encryption from Nordic’s Library (CVE-2020–15509)
Common Developer Pitfalls: A Guide to Bolstering Security
Breaking their Defense - Hacking Stories
Attack Surface Intelligence? 5 tools to boost your results!
Do you develop an IoT product? Read the Top 10 vulnerabilities you should be aware!
How skillful are you in BLE Security?
Mobile Bug Bounty Hunting? Enter BLE
Hacking Smartwatches for Spear Phishing
Testing a mobile app using a device you don’t have