You really don’t need that much in terms of know-how and equipment to find and take advantage of leaky radio signals. Towards the end, we will apply what we have learned to find a signal that can exfiltrate data out of a radio-less and air-gapped desktop workstation through a wall and 50ft away.
Duo Labs security researchers show how to bypass microcontroller interfaces used for internet of things (IoT) devices - these invasive attacks require physical access to typical microcontrollers.
We're excited to announce two new open-source tools designed to help administrators prevent, manage, and respond to phishing attacks against their organization - IsThisLegit and Phinn.
Learn about the science of Duo in space, a mission to perform the first Duo Push authentication from high into Earth's atmosphere while streaming live.
In the fourth of a weeklong series about the technology and process behind Duo In Space, Senior Security Researcher Mikhail Davidov reviews the test launch results and refines the payload based on his findings.