Given the explosion of development and interest in deep learning models in the past year, we decided to research on the topic to increase our know-how…

Lire la suite

Once again, reading blogs and tweets from James Forshaw led me to wonder how things work. This time, I was working on DCOM for my last blog post and…

Lire la suite

Earlier this year, several security researchers published research about using DCOM to coerce Windows systems to authenticate to other systems. This…

Lire la suite

Bug bounty programs have evolved into a critical element of modern cybersecurity. In this post, we give some answers to how bug bounty programs can…

Lire la suite

Last year we participated in the Pwn2Own 2023 Toronto competition and successfully exploited the Synology BC500 camera. The DEVCORE Internship Program…

Lire la suite