The Walls Have Ears

Introduction Modern business often relies heavily on the Internet and software resources such as Zoom or Skype to support daily operat... | Continue reading


@blog.grimm-co.com | 2 years ago

New Old Bugs in the Linux Kernel

  Introduction Dusting off a few new (old) vulns Have you ever been casually perusing the source code of the Linux kernel and thought to ... | Continue reading


@blog.grimm-co.com | 3 years ago

New Old Bugs in the Linux Kernel

  Introduction Dusting off a few new (old) vulns Have you ever been casually perusing the source code of the Linux kernel and thought to ... | Continue reading


@blog.grimm-co.com | 3 years ago

DJI Privacy Analysis Validation

Photo by Mitch Nielsen on Unsplash DJI Privacy Analysis Validation Given the recent controversy with DJI drones, a defense and publi... | Continue reading


@blog.grimm-co.com | 3 years ago

Soho Device Exploitation: Breakdown of the Netgear 0-Day

Netgear R7000 SOHO Device Exploitation After a long day of hard research, it’s fun to relax, kick back, and do something easy. While modern ... | Continue reading


@blog.grimm-co.com | 3 years ago

Netgear 0-day Vulnerability Analysis and Exploit for 79 devices

Netgear R7000 SOHO Device Exploitation After a long day of hard research, it’s fun to relax, kick back, and do something easy. While modern ... | Continue reading


@blog.grimm-co.com | 3 years ago