We provide comprehensive cybersecurity services for a broad range of firms. Our leading services team has years of experience solving challenging problems with real-world impact.

Our team adheres to ethical codes of conduct to maintain the confidentiality, integrity, and availability of your systems. We take client confidentiality very seriously and make a clear distinction between consulting services and open source community contributions.

We excel at solving problems, ranging from tactical to strategic, and are available for rapid turnaround consultations.

Contact us so we can discuss your needs.

Embedded & IoT penetration testing

We perform black or white-box analysis of hardware systems and firmware. These range from embedded systems to consumer products to large scale infrastructure. Our technical teams work across the entire stack from PCB to network. We often build custom tools to extract code, keys, and more.

Wireless reverse engineering

We perform in-depth wireless security assessments including radio frequency (RF) protocol reverse engineering and wireless penetration testing. We also provide consultation and design services to assist in the development of secure wireless systems. Our RF engineers, reverse engineers, and cryptographers work together to deliver complete solutions.

Hardware Supply Chain Security

We assess devices and supply chains to look for anomalies at the hardware level which could indicate supply-chain security issues. We work with your team to develop tactical plans for reviewing hardware security while developing strategies to reduce risk in the future.

Cryptography design and review

We recommend appropriate cryptographic protocols for your use cases, review cryptographic designs, and analyze algorithm implementations to assess and improve security.

Firmware security automation and devsecops

We provide solutions which automate firmware security, to allow security to be integrated early on and continuously in development processes.

Disclosure response consulting

Our team validates findings, compares solutions with best practices, and offers expert advice to the response teams when clients experience reported product vulnerabilities from external researchers.