oNEKEY -RESsourcen
Greifen Sie auf die neuesten Whitepapers, Datenblätter, Forschungsergebnisse und Sicherheitsempfehlungen zu Cybersicherheit und Compliance zu — alles an einem Ort.(teilweise nur in Englisch verfügbar)
Ausgewählte ReSsourcen
Alle ReSsourcen

Security Advisory: Unauthenticated Remote Command Execution in Multiple WAGO Products
Security Advisory: Critical unauthenticated command injection vulnerability in the "Legal Information" plugin of the WAGO Series PFC100 web interface.

Latest Developments in Unblob (2)
Revolutionize firmware extraction with UNBLOB! Discover the latest developments & advancements in this cutting-edge project. Don't miss latest blog post!

Leveraging ChatGPT to build a Hardware Fault Injection Tool.
This security insight explores the process of building an AI-assisted Teensy-based fault injection framework for testing system security. Learn more here!

Security Advisory: Multiple Vulnerabilities in Phoenix Contact Routers
Authenticated users can execute arbitrary commands with elevated privileges or access any file on the system. Read the latest security advisory here!

Security Advisory: Multiple Vulnerabilities in NetModule Routers
Multiple vulnerabilities identified in NetModule industrial routers. Are your industrial routers safe? Read the latest security advisory now!

ClamAV Critical Patch Review
In this technical deep dive, ONEKEY explores the underlying issues fixed by the recent critical patch released by ClamAV.

Understanding the EU Cyber Resilience Act and achieve product cybersecurity compliance with ONEKEY’s whitepaper
ONEKEY Whitepaper: Enhance EU CRA compliance. Streamline supply chain risk management & automate compliance controls for secure device market. Download now!

Security Advisory: Remote Command Execution in binwalk
Learn about the security vulnerability in binwalk v2.1.2b-2.3.3 that allows malicious PFS file extraction and remote code execution. 👉

EU-Cyber Resilience Act: Worauf Sie jetzt achten sollten
Bleiben Sie auf dem Laufenden und bleiben Sie geschützt mit unserem Blog zum EU Cyber Resilience Act. Erfahren Sie, was die neue Verordnung für Ihr Unternehmen bedeutet und wie Sie die Vorschriften einhalten können.
Bereit zur automatisierung ihrer Cybersicherheit & Compliance?
Machen Sie Cybersicherheit und Compliance mit ONEKEY effizient und effektiv.