Join us at #Typhooncon in Seoul for a training on Android Binder internals.
Weโll guide you through the complexities of low-level component exploitation, moving from root-cause analysis to a reliable proof-of-concept.
๐ Register here: www.eventbrite.com/e/1968561639... #cybersecurity
Posts by eShard
eShardโs pattern detector offers high-speed, live triggering for oscilloscopes, EM generators, and lasers, streamlining your workflow from acquisition to analysis.
๐ต esDynamic: eshard.com/esdynamic
๐ Get yours: eshard.com/contact
Weโre at #CASCADE in Regensburg ๐ฉ๐ช talking post-quantum crypto and how implementations hold up against side-channel attacks.
Live demo running all week. Come say hi ๐
Our next stop is CASCADE in Germany next week! ๐ฉ๐ช
Weโll be showcasing side-channel analysis applied to #PQC algorithms. ๐
Heading to SaTC in Houston ๐บ๐ธ
Weโll be focusing on side channel analysis on PQC algorithms, with a live demo.
If youโre attending SaTC, come say hi!
#cybersecurity #SaTC2026
Weโre grateful to @eshard.bsky.social for joining Offensivecon as a Gold Sponsor!
Back home after a great weekend at ph0wn ๐ซ๐ท
We ran a workshop on "Full system Time Travel Debugging on Android" before attendees took on our #CTF challenge.
The challenge is still live. Try it here ๐ ttd.eshard.com
Our #CTF continues its world tour: we're heading to ph0wn in France ๐ฉ
Come time travel debug our challenge for a chance to win cool prizes ๐
Weโre at @re-verse.io this week ๐
Come chat with us about what weโre building with esReverse, and join our #CTF.
We're going to @re-verse.io next week with a brand new CTF for our booth... ๐ If you're in Orlando, come say hi!
The Germanyโs Agency for Innovation in Cybersecurity explains further in their blog:
๐www.cyberagentur.de/presse/widerstandskraft-...
eShard is proud to join the SPARTAQUS project with Bundeswehr University Munich under the German government "SCA4PQC" program.
Over the next 4 years, weโll push state of the art tooling and #PQC security testing expertise to evaluate real world implementations for side-channel leakage.
Weโre hiring at eShard โจ
๐ eshard.com/careers
We helped #DEKRA set up their new SoC cybersecurity lab, integrating our tools and tightening the workflow so SCA and EMFI tests are repeatable from day one.
๐ How we did it: eshard.com/posts/dekra-...
#hardware #cybersecurity #hardwarehacking
๐ iOS emulator update: we now have an #AI assistant to support your iOS security investigations.
What do you think? ๐ฌ
Our shortlist is still ongoing: u.eshard.com/ios-emulation #ios #software #cybersecurity
Our first webinar of the year is done. Thanks to everyone who joined!
โถ Up next: ๐๐ฑ๐๐ฎ๐ป๐ฐ๐ฒ๐ฑ ๐๐ฎ๐ฟ๐ฑ๐๐ฎ๐ฟ๐ฒ ๐๐ฎ๐ฐ๐ธ๐ถ๐ป๐ด - ๐ ๐ผ๐ฑ๐ฒ๐ฟ๐ป ๐ง๐ฒ๐ฐ๐ต๐ป๐ถ๐พ๐๐ฒ๐
Stay tuned, more details coming soon.
#webinar #hardware #cybersecurity
It's this week ๐ฅ Register now to not miss out!
#Webinar | Kicking off the year with hands-on fault injection on modern devices.
We will look at recent attacks on MCUs, MPUs, and FPGAs, and how FI countermeasures can be validated early in development.
๐Session 1: u.eshard.com/m8ahb
๐Session 2: u.eshard.com/TjdEa
We wish everyone happy holidays! ๐
Update on the iOS emulator ๐ฅ
Weโve been deep into acceleration work lately, and the performance is already very promising for an emulated iOS18.
Still cooking, but weโre getting close to sharing it with you. And more is coming with iOS26...
#ios #emulation #devsecops
We're on our way to Germany for the @AMD Security Working Group.
We'll be showcasing a demo of a side channel attack targeting ML-KEM on an STM32, and how we approach hardware investigations.
#cybersecurity #hardware #postquantumcryptography
We're live! ๐ด Come watch us: youtu.be/nzar2L4GUJ8
๐ด We're going live with Binary Ninja, at 10am EST (3pm GMT / 4pm CET / 11pm SGT). Join us here: www.youtube.com/live/nzar2L4...
#cybersecurity #reverseengineering #binary #softwareengineering
Our Keccak webinar is a wrap! ๐ต Thank you to everyone who joined.
Ready for the next one? Tell us what you want to see next and we will make it happen. ๐ #cybersecurity
Itโs this week ๐ต Join us for a deep dive into Keccak and the side-channel angles behind its applications.
Register below โฌ
Session 1: u.eshard.com/wcUfh
Session 2: u.eshard.com/4hGSQ
#webinar #pqc #postquantum #nist
KMAC is one of the main ways Keccak is used in modern systems, which is why weโre exploring it through a practical use case in our next webinar.
Choose your timeslot and register below โฌ
Session 1: u.eshard.com/wcUfh
Session 2: u.eshard.com/4hGSQ
#pqc #nist
eShard and PQShield teamed up to put an ML-KEM hardware implementation through a real side-channel evaluation.
Take a look at what we found โก๏ธ eshard.com/posts/pqshie... #pqc #postquantum #nist #hardware