#firmware-verification

[ follow ]
Information security
fromSecuritymagazine
1 day ago

58% of Organizations Spend Over 10 Hours a Month Securing AI-generated Code

31% of organizations using AI-generated code spend 10 hours or less per month on validation and auditing, raising security concerns.
DevOps
fromMedium
1 week ago

Set it up once, test it properly, and let the system handle the rest.

Automating SSL certificate renewal prevents production outages and reduces stress during incidents.
#cybersecurity
Privacy professionals
fromWIRED
1 month ago

Cyberattack on a Car Breathalyzer Firm Leaves Drivers Stuck

Law enforcement dismantled major botnets while new vulnerabilities and privacy issues in tech continue to emerge, raising concerns over security.
Information security
fromThe Hacker News
3 weeks ago

TeamPCP Backdoors LiteLLM Versions 1.82.7-1.82.8 Likely via Trivy CI/CD Compromise

TeamPCP compromised the litellm Python package, embedding malicious versions that include a credential harvester and a persistent backdoor.
Information security
fromSecurityWeek
19 hours ago

Hackers Fail to Exploit Flaw in Discontinued TP-Link Routers

Hackers have targeted a vulnerability in discontinued TP-Link routers for a year without successful exploitation, according to Palo Alto Networks.
Information security
fromSecurityWeek
1 week ago

CPUID Hacked to Serve Trojanized CPU-Z and HWMonitor Downloads

The CPUID website was hacked, distributing malicious versions of popular hardware monitoring tools for approximately six hours.
Information security
fromThe Hacker News
1 week ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Privacy professionals
fromWIRED
1 month ago

Cyberattack on a Car Breathalyzer Firm Leaves Drivers Stuck

Law enforcement dismantled major botnets while new vulnerabilities and privacy issues in tech continue to emerge, raising concerns over security.
Information security
fromThe Hacker News
3 weeks ago

TeamPCP Backdoors LiteLLM Versions 1.82.7-1.82.8 Likely via Trivy CI/CD Compromise

TeamPCP compromised the litellm Python package, embedding malicious versions that include a credential harvester and a persistent backdoor.
fromTechzine Global
1 week ago

Supermicro launches investigation following case over server exports

Supermicro claims it is not a suspect in the case. However, the company did take action against the individuals involved. Two of them have been placed on leave, while a third person has been fired.
Intellectual property law
fromTheregister
2 weeks ago

The end of Linux i486 support looks nigh

"I *really* don't think i486 class hardware is relevant any more," Torvalds said in 2022, noting that while some people may still operate 486 systems they aren't relevant from a kernel development standpoint. "At some point, people have them as museum pieces. They might as well run museum kernels."
Software development
Roam Research
fromArs Technica
2 weeks ago

New Rowhammer attacks give complete control of machines running Nvidia GPUs

Rowhammer attacks on Nvidia GPUs can compromise CPU memory, allowing full control of host machines.
#secure-boot
Information security
fromZDNET
5 days ago

Microsoft's latest Windows update now confirms if your PC is Secure Boot-protected - how it works

Windows now indicates Secure Boot status, showing if the latest updates are installed and patching 164 security flaws.
fromZDNET
2 months ago
Information security

Your PC's critical security certificates may be about to expire - how to check

fromEngadget
2 months ago
Information security

Microsoft will start refreshing Secure Boot certificates in March for Windows 11 and Windows 10 ESU users

Information security
fromZDNET
5 days ago

Microsoft's latest Windows update now confirms if your PC is Secure Boot-protected - how it works

Windows now indicates Secure Boot status, showing if the latest updates are installed and patching 164 security flaws.
fromZDNET
2 months ago
Information security

Your PC's critical security certificates may be about to expire - how to check

fromEngadget
2 months ago
Information security

Microsoft will start refreshing Secure Boot certificates in March for Windows 11 and Windows 10 ESU users

Software development
fromDevOps.com
2 weeks ago

Why Code Validation is the Next Frontier - DevOps.com

Shared staging environments are inadequate for modern development; isolated, on-demand setups are needed for effective validation.
Information security
fromSecurityWeek
5 days ago

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Multiple industrial giants have released new ICS security advisories addressing various vulnerabilities since the last Patch Tuesday.
Women in technology
fromInfoQ
3 weeks ago

Security and Architecture: To Betray One Is To Destroy Both

Architecture and security have evolved from separate entities to a deeply connected partnership focused on resilience and protection against threats.
Gadgets
fromTheregister
3 weeks ago

Engineer sabotaged PC then complained when it didn't work

Ewen faced challenges with a fiber-optic device that produced faulty data, leading to a long drive to troubleshoot the issue.
fromTheregister
4 weeks ago

Junior disobeyed orders, tried untested feature during demo

Lydia noticed the machine's battery was running low and told two other team members. The more senior went to fetch the backup battery, while the junior team member suggested a quicker method that Lydia firmly rejected.
Gadgets
#ai-coding-assistants
DevOps
fromDevOps.com
1 month ago

The Risk Profile of AI-Driven Development - DevOps.com

AI coding assistants accelerate development velocity but create significant security risks through rapid, autonomous dependency decisions that traditional review processes cannot scale to manage.
Information security
fromwww.theguardian.com
1 week ago

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
fromDevOps.com
2 weeks ago

Is Your AI Agent Secure? The DevOps Case for Adversarial QA Testing - DevOps.com

The most dangerous assumption in quality engineering right now is that you can validate an autonomous testing agent the same way you validated a deterministic application. When your systems can reason, adapt, and make decisions on their own, that linear validation model collapses.
Information security
Software development
fromInfoQ
1 month ago

QCon London 2026: SBOMs Move From Best Practice to Legal Obligation as CRA Enforcement Looms

Software teams must urgently adopt SBOMs due to imminent regulatory requirements in the US and Europe, with enforcement beginning September 2026 and full compliance required by December 2027.
Business
fromHelen Min
1 month ago

Software isn't dying, but it is becoming more honest - Helen Min

SaaS's subscription-based billing model is evolving beyond fixed seat-based pricing toward usage-based and outcome-based billing models that better align costs with actual value delivered.
Information security
fromComputerWeekly.com
2 weeks ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Privacy technologies
fromTheregister
1 month ago

US state laws push age checks into the operating system

Multiple US states are mandating operating systems collect and share user age data with app stores and online services to restrict minors from inappropriate content, creating compliance challenges for FOSS vendors.
#windows-security
Information security
fromTheregister
3 weeks ago

Microsoft cracks down on old Windows kernel drivers

Microsoft will stop trusting kernel drivers not through the Windows Hardware Compatibility Program by April 2026 to enhance Windows kernel security.
Information security
fromTheregister
3 weeks ago

Microsoft cracks down on old Windows kernel drivers

Microsoft will stop trusting kernel drivers not through the Windows Hardware Compatibility Program by April 2026 to enhance Windows kernel security.
fromSecurityWeek
2 months ago

How to Eliminate the Technical Debt of Insecure AI-Assisted Software Development

This extends to the software development community, which is seeing a near-ubiquitous presence of AI-coding assistants as teams face pressures to generate more output in less time. While the huge spike in efficiencies greatly helps them, these teams too often fail to incorporate adequate safety controls and practices into AI deployments. The resulting risks leave their organizations exposed, and developers will struggle to backtrack in tracing and identifying where - and how - a security gap occurred.
Artificial intelligence
fromArs Technica
2 months ago

What happens to a car when the company behind its software goes under?

As vehicles become platforms for software and subscriptions, their longevity is increasingly tied to the survival of the companies behind their code. When those companies fail, the consequences ripple far beyond a bad app update and into the basic question of whether a car still functions as a car. Over the years, automotive software has expanded from performing rudimentary engine management and onboard diagnostics to powering today's interconnected, software-defined vehicles.
Cars
#tp-link
Information security
fromTechRepublic
3 weeks ago

TP-Link Fixes Bug That Lets Hackers Take Over Routers Without a Password

TP-Link patched critical vulnerabilities in Archer NX routers that allowed unauthorized firmware installation and network manipulation.
Information security
fromTechRepublic
3 weeks ago

TP-Link Fixes Bug That Lets Hackers Take Over Routers Without a Password

TP-Link patched critical vulnerabilities in Archer NX routers that allowed unauthorized firmware installation and network manipulation.
Philosophy
fromMedium
2 months ago

Why code is not the source of truth

Design specifications and blueprints, not implementation code, are the authoritative source of truth; implementation is derived from and judged against originating design authority.
Tech industry
from24/7 Wall St.
1 month ago

AMD Looks to Displace Intel With World's First Copilot+ Desktop Chips

The AI PC market will grow at 30% annually from 2025 to 2034, reaching $967 billion, driven by on-device AI demand, with AMD's Ryzen AI 400 Series challenging Intel's x86 dominance through superior AI performance capabilities.
Information security
fromSecurityWeek
3 weeks ago

Cisco Patches Multiple Vulnerabilities in IOS Software

Cisco released patches for high- and medium-severity vulnerabilities in IOS and IOS XE, primarily to prevent denial-of-service conditions.
Software development
fromFuturism
1 month ago

Entirely Vibe-Coded Operating System Is a Bug-Filled Disaster

Vibe-coded software development produces non-functional results, as demonstrated by Vib-OS, an entirely AI-generated operating system that is buggy and largely unusable despite claimed features.
fromZDNET
1 month ago

Your smart home may be at risk - 6 ways experts protect your devices from attacks

All smart homes are at risk of being hacked, but it's not a likely event. The type of bad actors that target smart homes and devices, such as security cameras, are opportunistic. They search randomly for easy targets -- they don't tend to choose a particular home to attack and then try to circumvent that specific system.
Privacy technologies
fromComputerworld
2 months ago

Testing can't keep up with rapidly advancing AI systems: AI Safety Report

AI systems continued to advance rapidly over the past year, but the methods used to test and manage their risks did not keep pace, according to the International AI Safety Report 2026. The report, produced with inputs from more than 100 experts across over 30 countries, said that pre-deployment testing was increasingly failing to reflect how AI systems behaved once deployed in real-world environments, creating challenges for organisations that had expanded their use of AI across software development, cybersecurity, research, and business operations.
Artificial intelligence
fromEngadget
2 months ago

Ring can now verify if a video has been altered

Ring has launched a new tool that can tell you if a video clip captured by its camera has been altered or not. The company says that every video downloaded from Ring starting in December 2025 going forward will come with a digital security seal. "Think of it like the tamper-evident seal on a medicine bottle," it explained. Its new tool, called Ring Verify, can tell you if a video has been altered in any way.
Gadgets
Information security
fromSecurityWeek
4 weeks ago

QNAP Patches Four Vulnerabilities Exploited at Pwn2Own

QNAP released patches for multiple vulnerabilities, including four critical issues demonstrated at Pwn2Own 2025 affecting SD-WAN routers.
Gadgets
fromZDNET
2 months ago

7 cool and useful things I can do with my Flipper Zero - as someone who's used it for years

Flipper Zero is a compact, versatile device providing sub-GHz radio, RFID/NFC, iButton, IR, and GPIO capabilities for many legitimate and practical uses.
DevOps
fromComputerWeekly.com
1 month ago

Open cyber standards key to cross-platform integration | Computer Weekly

Open standards enable interoperability across platforms and vendors, providing the balance between operational efficiency and functional flexibility while preventing vendor lock-in.
Software development
fromZDNET
1 month ago

Linux explores new way of authenticating developers and their code - here's how it works

The Linux kernel is transitioning from PGP-based developer identification to a more efficient system that addresses privacy concerns and streamlines the cumbersome face-to-face key-signing verification process.
Software development
fromDevOps.com
1 month ago

When AI Gets It Wrong: The Insecure Defaults Lurking in Your Code - DevOps.com

Generative AI accelerates code development but introduces security vulnerabilities because AI models learn insecure patterns from training data rather than understanding security principles.
Information security
fromThe Hacker News
1 month ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
Software development
fromInfoQ
2 months ago

How a Small Enablement Team Supported Adopting a Single Environment for Distributed Testing

Reusing one development environment with versioned deployments and proxy routing, enabled by a small enablement team and cultural buy-in, scales distributed-system testing.
fromMedium
2 months ago

Test smart: how to solve dilemmas as QA?

To find the typical example, just observe an average stand-up meeting. The ones who talk more get all the attention. In her article, software engineer Priyanka Jain tells the story of two colleagues assigned the same task. One posted updates, asked questions, and collaborated loudly. The other stayed silent and shipped clean code. Both delivered. Yet only one was praised as a "great team player."
Software development
Information security
fromThe Hacker News
1 month ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
Information security
fromSecurityWeek
1 month ago

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric

Industrial control system manufacturers Siemens, Schneider Electric, Mitsubishi Electric, and Moxa released multiple security advisories addressing critical and high-severity vulnerabilities in their ICS products.
Information security
fromTechzine Global
1 month ago

Cisco details further vulnerabilities in Catalyst SD-WAN Manager

Cisco disclosed five vulnerabilities in Catalyst SD-WAN Manager with CVSS scores ranging from medium to critical, two actively exploited, requiring immediate patching with no workarounds available.
fromdzone.com
2 months ago

Managing Changing Hardware/Peripherals in a Robust POS

Retail point-of-sale systems today offer a wide range of options for peripherals and hardware. Their technical specifications play a major role in selection, and big retailers often choose multiple vendors to reduce a single point of failure. This gives them an advantage to negotiate price or support as well. Technically, these peripherals also require updating with new models and may have new feature sets. This necessitates the redevelopment of point-of-sale applications, increasing development costs.
Information security
fromSecurityWeek
2 months ago

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, Phoenix Contact

Siemens has published eight new advisories. The company has released patches and mitigations for high-severity issues in Desigo CC, Sentron Powermanager, Simcenter Femap and Nastran, NX, Sinec NMS, Solid Edge, and Polarion products. A medium-severity flaw has been found in Siveillance Video Management Servers. Exploitation of the vulnerabilities can lead to unauthorized access, XSS, DoS, code execution, and privilege escalation.
Information security
Information security
fromThe Hacker News
2 months ago

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

Vendors released critical security patches across Microsoft, Adobe, SAP, and Intel TDX, addressing actively exploited zero-days, code-injection, authorization flaws, and multiple other vulnerabilities.
Information security
fromSecurityWeek
2 months ago

Organizations Warned of Exploited Linux Vulnerabilities

Critical GNU Inetutils telnetd authentication bypass (CVE-2026-24061) enables remote root via crafted Telnet USER variable, and kernel integer overflow (CVE-2018-14634) permits privilege escalation.
Information security
fromSecurityWeek
2 months ago

Organizations Urged to Replace Discontinued Edge Devices

End-of-support edge devices create major security risks and must be identified and replaced promptly to prevent exploitation by state-sponsored threat actors.
Information security
fromTheregister
2 months ago

CISA: Remove EOL edge kit before cybercriminals strike

CISA directs federal agencies to inventory and replace end-of-support edge devices within set timelines to eliminate critical intrusion risks.
Information security
fromTheregister
2 months ago

Techie's one ring brought darkness by shorting a server

A technician wearing a wedding ring shorted a server board, causing an outage, briefly concealed the failure, and service resumed after an unexpected reboot.
Information security
fromDEV Community
2 months ago

I Let Claude Write 60 Functions. 65-75% Had Security Vulnerabilities.

AI code generation models produce insecure code by default, with no statistically significant difference among the tested models.
Information security
fromThe Hacker News
1 month ago

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

Google disclosed a high-severity Qualcomm Graphics component vulnerability (CVE-2026-21385) being exploited in Android devices, with March 2026 patches addressing 129 total vulnerabilities including critical remote code execution and privilege escalation flaws.
fromSecurityWeek
1 month ago

Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking

According to CISA, Gardyn products were affected by two critical and two high-severity vulnerabilities. One of the critical flaws, tracked as CVE-2025-29631, is a command injection issue that can be exploited to execute arbitrary OS commands on the targeted device. The second critical vulnerability, CVE-2025-1242, is related to the exposure of hardcoded admin credentials that can be used to gain full control of the Gardyn IoT Hub.
Information security
Information security
fromDroids On Roids
2 months ago

When ZeroWidth Isn't Zero: How I Found and Fixed a Vulnerability | Blog

Unicode Variation Selectors can inflate UTF-16 storage size while still passing perceived-length checks, enabling payload injection, performance issues, and possible database crashes.
Information security
fromSecurityWeek
2 months ago

Microsoft to Enable 'Windows Baseline Security' With New Runtime Integrity Safeguards

Windows Baseline Security Mode will enable runtime integrity safeguards by default, allowing only properly signed apps, drivers, and services to run while permitting administrator overrides.
Information security
fromDevOps.com
2 months ago

Survey Surfaces More Focus on Software Security Testing and API Security - DevOps.com

Many enterprises plan to increase spending on software security testing, API security, and application security as AI-driven code growth strains DevSecOps capacity.
[ Load more ]