The Flipper Zero hacking device plans on selling $80 million worth of gadgets this year, up from preorders on Kickstarter that totaled over $5 million. It also claims to have sold $25 million of the devices last year.
The business, established in Russia in 2020, departed the nation at the outbreak of the conflict and has since relocated. It claims to no longer be connected to Russia.
Flipper Zero is a “portable gamified multi-tool” designed for anybody interested in cybersecurity, including penetration testers, intellectual people on the internet, students, and anyone with deeper motives.
The tool offers a variety of ways to control your environment, such as wireless devices (like garage openers), RFID card systems, remote keyless entry systems, Flipper Hacking Devices, key fobs, and barrier access. In essence, you may program it to mimic a variety of lock systems.
Additionally, it’s a fun experimentation tool that reveals how insecure the majority of the globe is in reality. The company also emphasizes that the firmware is open source and available for anybody to review.
“Current events will not affect the Flipper Zero production in any way, and all ordered devices will be shipped to backers and those who have pre-ordered, though there may be delays for customers from the CIS countries [the Commonwealth of Independent States] due to logistics disruptions in the region,” the company said in an Instagram post.
Flipper Devices, a firm that employs both Ukrainians and Russians, released a statement in which it declared that it strongly objects to the continuing “special military operation” and that neither of our team members supports it.
The firm is not Russian, according to a corporate representative. Its CEO and more than 10% of the crew are both Ukrainian.
According to TechCrunch report, the Flipper Zero device is on track to sell $80 million worth of its products this year
Further, Flipper Devices is a distributed business that is expanding its London headquarters. Additionally, it adds that Flipper Gadgets works to relocate all of its personnel outside of Russia, doesn’t hire there, and doesn’t export gadgets to Russia.
Some of their workers may travel there to visit family or for other personal reasons as they hold Russian passports.
Finally, it’s one of the simplest, most affordable methods to use RFID and NFC. It’s also an excellent instructional tool that introduces individuals of all ages to cybersecurity.
“AI-based email security measures Protect your business From Email Threats!” – .
Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch"…
Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based…
The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central…
Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to India,…
Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade detection…
Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new report…