Given the explosion of development and interest in deep learning models in the past year, we decided to research on the topic to increase our know-how…

Read more

Once again, reading blogs and tweets from James Forshaw led me to wonder how things work. This time, I was working on DCOM for my last blog post and…

Read more

Earlier this year, several security researchers published research about using DCOM to coerce Windows systems to authenticate to other systems. This…

Read more

Bug bounty programs have evolved into a critical element of modern cybersecurity. In this post, we give some answers to how bug bounty programs can…

Read more

Last year we participated in the Pwn2Own 2023 Toronto competition and successfully exploited the Synology BC500 camera. The DEVCORE Internship Program…

Read more