We really think research is what moves the information security community on and we invest countless hours in finding new vulnerabilities and exploiting brand new and really known technologies.

Most of our public research are described in this page.

Some of the major vulnerabilities and 0-day we have discovered have a related blog post providing further information on the methodology and techniques used during the exploitation.