Open-Source AI Assisted Firmware Analysis - WAIRZ

YouTube

Raspberry Pi OS Tightens Sudo Security with Password Mandate

Raspberry Pi OS just got a major security boost: the latest release now requires a password by default when using the sudo command, putting an end to its previously open-door policy and adding an extra layer of protection to your device. This simple yet significant change means you'll need to enter a password to access sudo, giving…

https://osintsights.com/raspberry-pi-os-tightens-sudo-security-with-password-mandate?utm_source=mastodon&utm_medium=social

#RaspberryPiOs #SudoSecurity #PasswordMandate #LinuxSecurity #IotSecurity

Raspberry Pi OS Tightens Sudo Security with Password Mandate

Raspberry Pi OS boosts sudo security, now requiring passwords by default, learn how this change impacts your device's safety and what you need to know. Read the full update now.

OSINTSights
DeskUp Pro smart standing desk controller integrates with Home Assistant and Homey Pro Smart Home hubs

Designed by SmartHomeGuys in the UK, the DeskUp Pro is an ESP32-based standing desk controller compatible with Home Assistant, Homey Pro, and other Smart Home hubs, using the desk's standard RJ11/RJ12 connection. Many modern standing desks come with a controller from Jiecang or another company featuring an RJ12 port. The DeskUp Pro plugs directly into this port, draws power without an external USB supply, and bridges the desk's controls to your 2.4 GHz Wi-Fi network. This allows you to automate your desk height, set health-focused standing reminders, or use voice assistants like Google Home and Alexa, all while keeping the desk's original physical keypad fully functional. DeskUp Pro specifications: MCU – Espressif Systems ESP32-C6 or ESP32-S3 microcontroller with 2.4GHz Wi-Fi and Bluetooth LE Desk connectivity – Built-in RJ11/RJ12 cable for data and power USB – USB Type-C port for initial setup and firmware flashing Misc Supported Jiecang control boxes JCB36NE2 (used

CNX Software - Embedded Systems News

⚙️ Technical Spotlight: New Session at BSides Luxembourg 2026

🚗🔐 𝗙𝗥𝗢𝗠 𝗖𝗔𝗡 𝗙𝗥𝗔𝗠𝗘𝗦 𝗧𝗢 𝗖𝗢𝗥𝗣𝗢𝗥𝗔𝗧𝗘 𝗙𝗜𝗥𝗘𝗪𝗔𝗟𝗟𝗦: 𝗟𝗜𝗙𝗘 𝗢𝗙 𝗔𝗡 𝗔𝗨𝗧𝗢𝗠𝗢𝗧𝗜𝗩𝗘 𝗦𝗘𝗖𝗨𝗥𝗜𝗧𝗬 𝗥𝗘𝗦𝗘𝗔𝗥𝗖𝗛𝗘𝗥 – Hrishikesh Somchatwar

Step inside the world of automotive cybersecurity in this 40-minute talk, where modern vehicles become complex attack surfaces spanning hardware, firmware, and cloud systems. From CAN bus manipulation to telematics abuse and backend exploitation, discover how real-world constraints shape both attacks and defenses in connected vehicle ecosystems.

Learn how attackers exploit in-vehicle networks, diagnostic interfaces, and wireless modules, and why securing cars is fundamentally different from traditional IT. Through practical case studies, this session highlights how even small vulnerabilities can lead to large-scale operational and financial impact in automotive environments.

Hrishikesh Somchatwar (@storytelnhacker) is an independent security researcher, bestselling author, and international speaker specializing in hardware and automotive cybersecurity. He has presented at leading global conferences and is known for combining deep technical expertise with engaging storytelling through his talks and The StorytellingHacker platform.

📅 Conference Dates: 6–8 May 2026 | 09:00–18:00
📍 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
📅 Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

📲 View full schedule & build your agenda: https://hackertracker.app/schedule?conf=BSIDESLUX2026

#BSidesLuxembourg2026 #AutomotiveSecurity #EmbeddedSecurity #IoTSecurity #HardwareHacking #CyberSecurity

Critical flaw in wolfSSL library enables forged certificate use

A critical vulnerability in the wolfSSL SSL/TLS library can weaken security via improper verification of the hash algorithm or its size when checking Elliptic Curve Digital Signature Algorithm (ECDSA) signatures.

BleepingComputer
🛑 CRITICAL: CVE-2026-6156 in Totolink A7100RU (7.4cu.2313_b20191024) enables unauthenticated OS command injection via setIpQosRules. No patch yet — restrict access & monitor updates. Exploit is public. Details: https://radar.offseq.com/threat/cve-2026-6156-os-command-injection-in-totolink-a71-061dc469 #OffSeq #IoTSecurity #Vuln
Totolink A7100RU (7.4cu.2313_b20191024) faces CRITICAL OS command injection (CVE-2026-6139, CVSS 9.3). Remote, unauthenticated exploit possible. No patch yet — isolate & monitor! https://radar.offseq.com/threat/cve-2026-6139-os-command-injection-in-totolink-a71-92890d24 #OffSeq #infosec #vuln #IoTSecurity
🚨 CRITICAL: Totolink A7100RU 7.4cu.2313_b20191024 exposed to OS command injection via UploadFirmwareFile in /cgi-bin/cstecgi.cgi. Public exploit available — restrict access & monitor now. CVE-2026-6140 https://radar.offseq.com/threat/cve-2026-6140-os-command-injection-in-totolink-a71-8e1c7584 #OffSeq #Vulnerability #IoTSecurity
⚠️ CRITICAL OS command injection (CVE-2026-6132) in Totolink A7100RU routers (7.4cu.2313_b20191024). Unauthenticated remote code execution possible. No patch yet — restrict access & monitor closely. Details: https://radar.offseq.com/threat/cve-2026-6132-os-command-injection-in-totolink-a71-401747c5 #OffSeq #CVE20266132 #IoTSecurity

The Rise of Autonomous Drone Swarms | VICE: Cyberwar | Blueprint

https://www.youtube.com/watch?v=832uh2YJBr8

#cybersecurity #aisecurity #iotsecurity #autonomous

The Rise of Autonomous Drone Swarms | VICE: Cyberwar | Blueprint

YouTube