Careers Contact
Home

LATEST NEWS

< BLOG / >

Goal Zero Firmware Inverter Exploitation – Disrupting AM with a UPS

Can 3D print operations be disrupted from an upstream exploit?  In this blog we will explore how an alternative energy [...]
READ MORE ›

Fact Checking Hollywood 3D Printer Hacking

How accurate is this scene from Person of Interest Honor Among Thieves – Season 4 Episode 7? In this scene we [...]
READ MORE ›

AI Optimization of Processes in AM Environments

There are several barriers to the widespread adoption of desktop 3D printers. One of the main barriers is the high [...]
READ MORE ›

BreakPoint Labs awarded SBIR Phase III – Enhancing BISON to Additive Manufacturing Cybersecurity

BreakPoint Labs has successfully completed a direct to Phase IIB SBIR effort to tailor BISON (BreakPoint Labs Integrated Sensor for [...]
READ MORE ›

Additive Manufacturing – Medical Devices and Tools

3D printed prosthetics have been popularized in the news for providing custom fit prosthetic limbs for veterans, children and others [...]
READ MORE ›

Don’t Let Ransomware PIN Production Down

With recent world events, ransomware is a foremost concern in cybersecurity.    RagnarLocker has made headlines after compromising 52 critical [...]
READ MORE ›

Run TMC: Component Level Connectivity – It’s Tricky

Let’s talk about heat.  You might be wondering what your thermostat has to do with additive manufacturing or cyber security [...]
READ MORE ›

Tracking An Effective Ransomware Campaign – Part 3

The more things change, the more they stay the same. Ransomware attacks continue to disrupt organizations across all sectors while [...]
READ MORE ›

Tracking An Effective Ransomware Campaign – Part 2

Since our last post at the end of August 2021, we have continued to track an effective ransomware group and they [...]
READ MORE ›

Cobalt Strike and Ransomware – Tracking An Effective Ransomware Campaign

During the course of multiple incident response engagements, we encountered a persistent, unknown ransomware threat group utilizing an obfuscated Golang [...]
READ MORE ›
1 2 3 4

SCHEDULE A FREE CYBERSECURITY ASSESSMENT CONSULTATION

Contact
chevron-down