Our mission

We explore
software weaknesses

Research

Security Explorations conducts security and vulnerability research with respect to the most challenging software security technologies.

Let's go

Commercial

AG Security Research is responsible for the commercial part of our activity. Visit the website and learn more about our core competences.

Let's go

News

Microsoft Warbird and PMP
22
MAR 2024

Microsoft Warbird and PMP security research

Security Explorations conducted security analysis of Microsoft Warbird and Protected Media Path technologies (...)

Read more
Security vulnerabilities in Cinterion IoT devices
24
APR 2023

Security vulnerabilities in Cinterion IoT devices

Security Explorations discovers multiple security vulnerabilities in Telit Cinterion IoT modem gateway devices (...)

Read more
Microsoft PlayReady security research
15
AUG 2022

Microsoft PlayReady security research

Security Explorations conducted security analysis of Microsoft PlayReady content protection technology in the environment of CANAL+ SAT TV (...)

Read more
AG Security Research lab
27
JUL 2022

AG Security Research lab

Security Explorations becomes a security research laboratory of AG Security Research company

Read more

Projects

During our research efforts, we investigate in detail security of a target software or technology in order to find weaknesses in its design and implementation.

SIM / USIM cards

SIM / USIM
cards

Read more
Microsoft Wwarbird and PMP

Microsoft Warbird
and PMP

Read more
Cinterion IoT devices

Cinterion IoT
devices

Read more
Microsoft PlayReady

Microsoft
PlayReady

Read more
Java Card

Java Card

Read more
NC+ SAT TV Platform

NC+ SAT TV
Platform

Read more
ST DVB Chipsets

ST DVB
Chipsets

Read more
Google App Engine for Java

Google App Engine
for Java

Read more
Oracle Database Java VM

Oracle Database
Java VM

Read more
Oracle Java Cloud Service

Oracle Java
Cloud Service

Read more
Java SE

Java SE

Read more
Digital satellite TV platform

Digital satellite
TV platform

Read more
Mobile Java and Nokia phones

Mobile Java and
Nokia phones

Read more
CBS
CNN
Forbes
Dark reading
Bloomberg
Ars Technica
Reuters
CNET
Computerworld

Media

Our research was featured over 200 times in various digital and printed media publications. This includes renown media outlets and international technical news portals.

(…) security researchers at the Polish firm Security Explorations revealed another critical security flaw in Java that affects users of every browser that runs the plugin, including Chrome, Firefox, Safari and Internet Explorer, allowing a malicious hackers to gain complete control of a victim's machine through a rigged website.

Read more
Forbes

A new zero-day exploit in multiple versions of Java puts roughly 1 billion users at risk to attackers and malicious code. The flaw was discovered by researchers at Poland's Security Explorations, a security firm that already has a known penchant for unearthing flaws in Java's notoriously buggy programming language.

Read more
NBC

Reuters reports that Adam Gowdiak, Java security expert at Security Explorations, says Oracle's update leaves "several critical security flaws" unfixed. "We don't dare to tell users that it's safe to enable Java again," Gowdiak told Reuters.

Read more
CBS

Oracle issued an emergency fix today for vulnerabilities in its Java software about four months after Security Explorations, a security firm, warned the company about the bugs. The delay in providing a fix allowed more than 100,000 computers to get hacked, security firm FireEye estimated. So why did it take this long to provide a patch?

Read more
Bloomberg

Quick facts

uncovered Java security issues

~100

uncovered Java
security issues

Argus Hacking Contest co-winner

No.1

Argus Hacking Contest co-winner

dollars in rewards for a project targeting Google App Engine

~100k

dollars in rewards for a project targeting Google App Engine

featured over 200 times in various publications

>200

featured over 200 times in various publications

Contact us

Have questions? We encourage you to contact us by e-mail.

Let’s go