Research Blog
Stay up to date with the newest security advisories, vulnerability reports, and platform developments—keeping your products secure and compliant.
Featured research articles
All research articles

Spotting Silent Patches in OSS with Binary Static Analysis
Uncover silent patches in OSS with our binary static analysis. Understand the role of in-depth vulnerability management beyond CVE tracking.

Security Advisory: Remote Command Execution in Cisco Access Point WAP Products
Learn about the vulnerabilities affecting Cisco's WAP371 and other Small Business Wireless APs, and the importance of binary static analysis.

Binary Static Analysis - The Final Frontier
Uncover ONEKEY's new Binary Zero-Day Identification feature, designed to identify vulnerabilities in executable binaries. Click now to find out more.

Latest Developments in Unblob (3)
Discover the latest developments in UNBLOB. Explore FileSystem Sandboxing, UI enhancements, and advanced Pattern Identification in our latest blog post 👇️

Making TOCTOU Great again - X(R)IP
ONEKEY Seucrity Insight: Delve into TOCTOU vulnerabilities in embedded systems utilizing XiP. Discover how these gaps at the hardware level can compromise secure boot processes.

Security Advisory: Clock Fault Injection on Mocor OS - Password Bypass
Discover the critical vulnerabilty in the Mocor OS on UNISOC SC6531E devices that allows unauthorised users to bypass locks via clock fault injection.

Security Advisory: Unauthenticated Remote Command Execution in Multiple WAGO Products
Security Advisory: Critical unauthenticated command injection vulnerability in the "Legal Information" plugin of the WAGO Series PFC100 web interface.
check out white papers
Explore in-depth whitepapers on cybersecurity and compliance, designed to strengthen your product’s security and compliance.
Ready to automate your Product Cybersecurity & Compliance?
Make cybersecurity and compliance efficient and effective with ONEKEY.