Subreption releases research exposing critical security flaws in FIPS/Common Criteria certified enterprise network switches
Subreption publicly releases FLAPPYSWITCH research, exposing critical vulnerabilities in CommScope/Ruckus FastIron-based ICX enterprise switches, highlighting severe risks affecting government-certified FIPS/Common Criteria products deployed globally.
SecuredDrop available
Subreption has made available a SecureDrop installation for sources to anonymously submit materials. Already established in 2022, the installation offers unparalleled ease of use and safety to those who might be considering submitting materials to us, related to any of our areas of expertise, open source projects and other cooperative efforts, as well as the business operations of Subreption and its customers.
BIRDWATCH program: Ghost in the Orlan: demystifying a military drone platform (CVE-2022-38161)
August 2022. Subreption publishes the first technical report of a software vulnerability affecting the Orlan-10 military drone system, its software internals and weaknesses in the handling of the FPGA software for C2 and data communications and other components. The report constitutes the first vulnerability publicly documented for a military drone platform. A program for research of military drone platforms is also announced, in cooperation with NGOs and institutions interested in factual research of such systems.
2022 DJI Alleged Drone ID Vulnerabilities
May 2022. Subreption publishes its stance on the recent 'hype' surrounding vaguely technical issues related to DJI's so-called Drone-ID broadcasts, and the misrepresentation of these alleged security vulnerabilities as a publicity stunt, while also ignoring prior work by well-respected industry peers. A complete rebuttal of these claims and their motivations is provided.
Subreption awarded DARPA Cyber Fast Track funding for high assurance mobile computing R&D
January 2012. Subreption LLC has been awarded with a DARPA Cyber Fast Track contract (under solicitation DARPA-RA-11-52) to research and develop the next generation of proactive defenses designed to deter exploitation of security vulnerabilities related to dynamic memory allocators, in operating system cores and applications.
Newsletter
Receive our latest updates via e-mail.