Preview image for a blog post

Precision Exploitation: How Single-Thread Emulation Unlocks Critical IoT Vulnerabilities

Talos leveraged targeted emulation and fuzzing of an IoT gateway's Modbus thread, uncovering six critical vulnerabilities efficiently.
Preview image for a blog post

Finally, a Wall-Mounted Smart Heater: A Cybersecurity Deep Dive into its Operational Security and OSINT Footprint

A senior cybersecurity researcher's technical analysis of the Dreo Smart Wall Heater, focusing on IoT security, data privacy, and OSINT implications.