Huge thanks to Droppy & The Sleuth! We’re really proud to support the community again this year as a Gold Sponsor. Thanks for everything you do to bring people together and grow the space, we’re glad to play a small part in it.
Huge thanks to Droppy & The Sleuth! We’re really proud to support the community again this year as a Gold Sponsor. Thanks for everything you do to bring people together and grow the space, we’re glad to play a small part in it.
Merry Christmas from the InfoSect crew! 🎄
Had a great day celebrating with the team and wrapping up a big year.
Here are a few photos from the party - hope everyone has a safe and relaxing break!
InfoSect had a great day at the ADF Cyber Skills Challenge - we’re running 2 days of hands-on hardware workshops and presented on the skills and steps to become a vulnerability researcher, using a real embedded target to show the process end-to-end.
The InfoSect team took out 2nd place in the Hardwear.io CTF!
hardwear.io is an absolute must-do for anyone working in embedded assessments, and it’s a conference we attend every year. Huge thanks to the organisers for another excellent event.
Half the InfoSect crew is heading across the ditch to @kawaiicon.bsky.social! 🇳🇿✨
Fourteen of us will be there this weekend Come say hi if you spot the team around. We’re looking forward to catching up with our Kiwi cousins and checking out the talks.
Angus from the InfoSect team gave a great talk at BSides Perth - Walkthrough of an N-day Android GPU driver vulnerability.
A solid deep dive into an old ARM Mali GPU bug and how small mistakes in kernel APIs become exploitable. Thanks to the organisers for another awesome event!
New blog post: Exploiting the Synology TC500 at Pwn2Own Ireland 2024
We built a format string exploit for the TC500 smart cam. It didn’t get used, but it made for a fun case study.
blog.infosectcbr.com.au/2025/08/01/e...
Court and Rami went to hardwear.io USA last week – thank you to the organisers and speakers for an excellent event.
They also placed 3rd in the CTF – not bad for a two-person team.
We’re hiring Vulnerability Researchers at @infosectcbr.bsky.social that specialise in Linux, OS kernels, Android, and embedded/IoT. With a world class hardware lab, come join our friendly and collaborative team, focusing on research against leading technologies. DM for details.
Proud of the InfoSect team for taking 2nd place in the BSides Adelaide CTF and 1st in the GRC competition! The challenges weren’t geared to our usual strengths, so placing this well is a fantastic result. Thanks to the conference and CTF organisers for a great event!
CrikeyCon is honoured to have @infosectcbr.bsky.social join us as Gold sponsors this year. The InfoSect crew have been supporters of CrikeyCon since the start - as presenters, contributors, attendees, and most importantly friends of Crikey. To have you sponsor too is a real privilege! Thanks!
We’re absolutely stoked to support @crikeycon.bsky.social this year! From the very start, it’s been an incredible conference run by an amazing crew, and we’ve loved being part of it as attendees, presenters, and friends. Can’t wait for another fantastic year!
Sam speaking at CSides on the Synology TC500 Pwn2Own 2024 attempt by @infosectcbr.bsky.social
See our bug that we exploited that was patched the day before we flew out to Pwn2Own.
Had a vendor demo given at @infosectcbr.bsky.social of the new 3rd generation mantis microscope by vision engineering. Looked pretty good!
At #Pwn2Own Ireland, our team successfully exploited vulnerabilities in the Lorex 2K Indoor WiFi Camera. Check out our blog for the full technical breakdown: blog.infosectcbr.com.au/2024/12/expl...
We’ve come so far ✨
A better classroom and engagement space is on the horizon 🙌