How 5G and IoT devices open up the attack surface on enterprises

As 5G standards continue to evolve, what steps can development organizations take now to improve the security of billions of 5G and IoT devices and systems?
The post How 5G and IoT devices open up the attack surface on enterprises appeared first on So… Continue reading How 5G and IoT devices open up the attack surface on enterprises

Uncover SweynTooth vulnerabilities with Defensics fuzz testing

SweynTooth is a set of Bluetooth Low Energy vulnerabilities. We can reproduce many of these vulnerabilities using Defensics Bluetooth LE Test Suites.
The post Uncover SweynTooth vulnerabilities with Defensics fuzz testing appeared first on Software In… Continue reading Uncover SweynTooth vulnerabilities with Defensics fuzz testing

5G: Vast potential, but better security needed

5G security is top of mind for those who recognize that 5G is going to be higher risk. Fuzzing is one of the leading testing techniques for securing 5G.
The post 5G: Vast potential, but better security needed appeared first on Software Integrity Blog…. Continue reading 5G: Vast potential, but better security needed

World’s top hackers meet at the first 5G Cyber Security Hackathon

Our Defensics R&D team put a couple of Synopsys tools to the test in the 5G Cyber Security Hackathon in Oulu, Finland, and placed in both of their competitions.
The post World’s top hackers meet at the first 5G Cyber Security Hackathon appea… Continue reading World’s top hackers meet at the first 5G Cyber Security Hackathon

[Webinars] Automotive fuzz testing and financial services AppSec

Learn how agent instrumentation improves fuzz testing of automotive IVI and telematics systems, and about financial services application security.
The post [Webinars] Automotive fuzz testing and financial services AppSec appeared first on Software Int… Continue reading [Webinars] Automotive fuzz testing and financial services AppSec

WPA2 encryption bypass: Using Defensics to uncover behavioral vulnerabilities

We discovered a WPA2 encryption bypass vulnerability (CVE-2018-18907) in a router that allows full access to a WLAN without credentials. The vendor has released a patch for the device. As part of Defensics SafeGuard development, we uncovered a vulnerab… Continue reading WPA2 encryption bypass: Using Defensics to uncover behavioral vulnerabilities

Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol

This is the second of two articles that describe how to use the Defensics SDK in fuzzing Bitcoin. In the previous article, you saw how to set up a test bed for bitcoind. We created two containers, alice and bob, and were able to set up communicati… Continue reading Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol

Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network

This is the first of two articles that describe how to use the Defensics SDK to fuzz Bitcoin software. Specifically, you will learn how to model one of the Bitcoin protocol messages and use the Defensics SDK to perform fuzzing on the bitcoind proc… Continue reading Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network