<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"><channel><description>We secure software with deep-dive audits, cutting-edge research, and in-depth trainings. </description><link>https://bsky.app/profile/neodyme.io</link><title>@neodyme.io - Neodyme</title><item><link>https://bsky.app/profile/neodyme.io/post/3mhs7m5y2tk2b</link><description>New blog post 🚨 &#xA;&#xA;We&#39;re diving deeper into a privilege escalation issue (CVE-2024-476) in Lenovo Display Control Center used across Windows enterprise environments.&#xA;&#xA;👉 Read the full breakdown: https://neodyme.io/en/blog/lenovo_dcc_lpe_fwupdate/</description><pubDate>24 Mar 2026 09:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3mhs7m5y2tk2b</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3mcf27igldc2c</link><description>Drones are hot  - their security is not.&#xA;Here is how removed the NAND, dumped firmware, and reverse-engineered ECC on a consumer drone. Stay tuned for part 2!&#xA;https://neodyme.io/de/blog/drone_hacking_part_1/</description><pubDate>14 Jan 2026 12:13 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3mcf27igldc2c</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3m3usj2xo3k2n</link><description>Another amazing #Pwn2Own in the books! 💪 &#xA;Our team pulled off some great hacks: &#xA;🖨️ HP Printer — $20K / 2 MoP &#xA;🏠 Home Assistant — $15K / 3 MoP &#xA;🔌 Smart Plug — $20K / 2 MoP &#xA;📸 Canon — $10K / 2 MoP &#xA;Total: $65K / 9 MoP &#xA;So proud of what we achieved together! 🧠⚡</description><pubDate>23 Oct 2025 16:42 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3m3usj2xo3k2n</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3m3udhaakm22n</link><description>Check out our new blog post on a research-driven look at software-only DRM. Explore how the Qiling emulation framework can be used to analyze Widevine and how Differential Fault Analysis (DFA) and emulation aid de-obfuscation. &#xA;▶️ Read more: https://neodyme.io/en/blog/widevine_l3/</description><pubDate>23 Oct 2025 12:12 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3m3udhaakm22n</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3m3rwx3wpyk2n</link><description>Shout-out to our colleagues at #Pwn2Own in Cork: https://www.youtube.com/watch?v=e20DqdnaX5M</description><pubDate>22 Oct 2025 13:23 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3m3rwx3wpyk2n</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3m3pe3iyrls2n</link><description>While our colleagues hack live at #Pwn2Own in Cork, take a look at our newly published last year&#39;s writeup on our blog: We compromised a QNAP router to take over a networked Canon printer. &#xA;▶️ Read the findings and how we got there: https://neodyme.io/en/blog/pwn2own-2024_qhora/</description><pubDate>21 Oct 2025 12:40 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3m3pe3iyrls2n</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3m3fmxzvaj22p</link><description>Heading to #hack_lu? 🔐&#xA;Our colleague Felipe will discuss how partial emulation and DFA can be used to study a legacy version of Widevine L3, Google&#39;s software-based DRM. &#xA;➡️ Dive into the past to strengthen future DRM security.&#xA;&#xA;🗓️ Oct 23 at 2:15pm&#xA;2025.hack.lu/agenda/&#xA;https://2025.hack.lu/agenda/</description><pubDate>17 Oct 2025 15:53 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3m3fmxzvaj22p</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3m25aqk67hs2y</link><description>⚡️ Lenovo DCC contained an easy-to-exploit LPE: a weak ACL bug → local privilege escalation → full admin 🖥️👨‍💻&#xA;We break it down with reverse engineering, process tracing, &amp; two exploit strategies. Read Part 1 of our deep dive: 👉 https://neodyme.io/de/blog/lenovo_dcc_lpe_logic/</description><pubDate>01 Oct 2025 14:28 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3m25aqk67hs2y</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3lyxhfuelrk2f</link><description>▶️ We built a proof-of-concept post-quantum FIDO authenticator. It&#39;s phishing- AND quantum-resistant. &#xA;✅️ Bonus: it even outperforms Google&#39;s prototype. 👀 &#xA;Full write-up here: https://neodyme.io/en/blog/pqc-fido/</description><pubDate>16 Sep 2025 13:46 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3lyxhfuelrk2f</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3ly3xjwscic2s</link><description>☀️ Teamwork doesn&#39;t just happen at the desk. This week, our crew is in Mallorca, building ideas, strengthening bonds, and enjoying some well-deserved sunshine together. 🌴&#xA;&#xA;Great collaboration comes from trust, connection, and a shared good vibe ✨</description><pubDate>05 Sep 2025 15:20 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3ly3xjwscic2s</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3lwbb4qlsz22c</link><description>Back from @blackhatevents.bsky.social &amp; @defcon.bsky.social! 🎉&#xA;Our colleagues delivered insightful trainings on crypto hacking and binary exploitation and got amazing feedback from the crowd 🙌&#xA;Missed it? We offer tailored security trainings for companies too. Just reach out.</description><pubDate>13 Aug 2025 07:04 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3lwbb4qlsz22c</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3lurorz42sk2n</link><description>We reported a vulnerability in Parallels Client via the ZDI last year. &#xA;🔥 The issue (CVE-2025-6812) - now fixed: A privileged service searched for an OpenSSL config file in an unsecured location, enabling LPE. &#xA;➡️ Advisory here: https://neodyme.io/en/advisories/cve-2025-6812/ &#xA;☂️ Patch your systems!</description><pubDate>25 Jul 2025 09:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3lurorz42sk2n</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3ltm3kppjvs2t</link><description>🔧✨ On our company retreat this week, we&#39;re diving into hardware and protocol hacking: fingerprint sensors, smart locks, drones and Bluetooth speakers. A great mix of hands-on research, creative exploration, and team bonding over board games! 🎲</description><pubDate>10 Jul 2025 10:08 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3ltm3kppjvs2t</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3lt2aeuimgs2a</link><description>🎤At 4pm today at the &#34;Festival der Zukunft&#34;, our colleagues dive into:&#xA;&#34;Black Hat, White Hat, Cyberwar - Modern Attacks and Defense&#34;&#xA;&#xA;From hacking-as-a-service to cyberwarfare, discover how attacks are evolving and what it means for digital defense.&#xA;🕵️‍♀️ Don&#39;t miss it!</description><pubDate>03 Jul 2025 07:47 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3lt2aeuimgs2a</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3lsyex535bc2n</link><description>Think your speech model is secure?&#xA;It might be quietly leaking what it was trained on.&#xA;&#xA;In a new blog post, we explain membership inference attacks and why they matter for cyber security experts.&#xA;🔗 https://neodyme.io/en/blog/membership_inference/</description><pubDate>02 Jul 2025 14:03 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3lsyex535bc2n</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3lsbfeomb6c2n</link><description>Meet our colleagues at the &#34;Festival der Zukunft&#34; at Deutsches Museum in Munich. Don&#39;t miss our talk on July 3 at 4pm! &#xA;Check it out here: https://www.1e9.community/festival-der-zukunft/programm/2025/black-hat-white-hat-cyberwar-the-dark-side-of-the-net</description><pubDate>23 Jun 2025 10:39 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3lsbfeomb6c2n</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3lqx7syzya22y</link><description>🏆 Throwback to #Pwn2Own Toronto 2022: &#34;Routers are just Linux boxes with antennas.&#34; So we treated one like it. At #Pwn2Own 2022, we turned a Netgear RAX30 into a stepping stone for a full LAN pivot. Story: https://neodyme.io/en/blog/pwn2own-2022_router_rce/</description><pubDate>06 Jun 2025 16:08 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3lqx7syzya22y</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3lqaiklstpc2n</link><description>Part 3 of our Riverguard series is out! &#xA;We&#39;re looking under the hood at the &#34;fuzzcases&#34; Riverguard uses to catch real-world bugs in Solana smart contracts. &#xA;Still shocked how often some of these pop up. &#xA;Check it out 👉 https://neodyme.io/en/blog/riverguard_3_fuzzcases/</description><pubDate>28 May 2025 15:13 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3lqaiklstpc2n</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3lq7zagau3c2n</link><description>Once again this year, a few colleagues couldn’t resist jumping into the HTB CTF to take on experts from around the world. 💻&#xA;A great challenge with a wide range of categories.&#xA;The result: 1st place in 🇩🇪 and top 3 in 🇪🇺.</description><pubDate>28 May 2025 10:39 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3lq7zagau3c2n</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3lpqxxdumu22f</link><description>At #Pwn2Own Ireland 2024, we successfully targeted the SOHO Smashup category. 🖨️&#xA;Starting with a QNAP QHora-322 NAS, we pivoted to the Canon imageCLASS MF656Cdw - and ended up with shellcode execution.&#xA;Read the full vulnerability deep dive here 👉 https://neodyme.io/en/blog/pwn2own-2024_canon_rce/</description><pubDate>22 May 2025 11:06 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3lpqxxdumu22f</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3lpe5xlvcks2i</link><description>Day 2 at OffensiveCon has just started and our colleagues Kolja Grassmann and Alain Rödel are right in the middle of it! 🔥&#xA;Can&#39;t wait to hear the insights they bring back from some of the sharpest minds in offensive security. If you&#39;re there too, make sure to say hi!</description><pubDate>17 May 2025 08:49 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3lpe5xlvcks2i</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3lo6ogbgxns2n</link><description>From iframes and file reads to full RCE. 🔥&#xA;&#xA;We found an HTML-to-PDF API allowing file reads and SSRF - then chained it into remote code execution via a Chromium 62 WebView exploit.&#xA;&#xA;👉 Read the full write-up here: https://neodyme.io/en/blog/html_renderer_to_rce/</description><pubDate>02 May 2025 11:03 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3lo6ogbgxns2n</guid></item><item><link>https://bsky.app/profile/neodyme.io/post/3lnwsexnods2b</link><description>Interested in learning about Windows exploitation?&#xA;&#xA;This August, join us in Las Vegas for an intensive, hands-on 4-day DEFCON training:&#xA;Binary Exploitation on Windows, led by Felipe and Kolja!&#xA;&#xA;🗓️ When: August 9–12, 2025&#xA;📍 Where: Las Vegas Convention Center</description><pubDate>29 Apr 2025 07:52 +0000</pubDate><guid isPermaLink="false">at://did:plc:gov5lfrt3wf5dbbperqns6hq/app.bsky.feed.post/3lnwsexnods2b</guid></item></channel></rss>