Lukas Ziegler (@lukas_m_ziegler)

Beckhoff의 XPlanar 시스템이 Provisur Technologies의 Free Movement System(FMS)에 적용되어 자석 부상(magnetic levitation)을 이용한 식품 이송 방식을 제시합니다. 벨트·롤러 대신 자유 이동식 리니어 모듈로 식품 가공 공정의 유연성·위생성·자동화를 개선하려는 혁신적 적용 사례입니다.

https://x.com/lukas_m_ziegler/status/2030972187960603014

#xplanar #beckhoff #provisur #foodtech #automation

Lukas Ziegler (@lukas_m_ziegler) on X

Levitating food transport! 🥓 Food handling with magnetic levitation. Beckhoff's XPlanar system is powering a new Free Movement System (FMS) from Provisur Technologies that reimagines how food products are moved in processing plants. Instead of belts or rollers, XPlanar uses

X (formerly Twitter)

CVE Alert: CVE-2025-41726 - Beckhoff Automation - Beckhoff.Device.Manager.XAR - https://www.redpacketsecurity.com/cve-alert-cve-2025-41726-beckhoff-automation-beckhoff-device-manager-xar/

#OSINT #ThreatIntel #CyberSecurity #cve-2025-41726 #beckhoff-automation #beckhoff-device-manager-xar

CVE Alert: CVE-2025-41726 - Beckhoff Automation - Beckhoff.Device.Manager.XAR - RedPacket Security

A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to the web service of the Device Manager or locally via an API

RedPacket Security

CVE Alert: CVE-2025-41727 - Beckhoff Automation - Beckhoff.Device.Manager.XAR - https://www.redpacketsecurity.com/cve-alert-cve-2025-41727-beckhoff-automation-beckhoff-device-manager-xar/

#OSINT #ThreatIntel #CyberSecurity #cve-2025-41727 #beckhoff-automation #beckhoff-device-manager-xar

CVE Alert: CVE-2025-41727 - Beckhoff Automation - Beckhoff.Device.Manager.XAR - RedPacket Security

A local low privileged attacker can bypass the authentication of the Device Manager user interface, allowing them to perform privileged operations and gain

RedPacket Security

CVE Alert: CVE-2025-41701 - Beckhoff - TE1000 | TwinCAT 3 Enineering - https://www.redpacketsecurity.com/cve-alert-cve-2025-41701-beckhoff-te1000-twincat-3-enineering/

#OSINT #ThreatIntel #CyberSecurity #cve-2025-41701 #beckhoff #te1000-twincat-3-enineering

CVE Alert: CVE-2025-41701 - Beckhoff - TE1000 | TwinCAT 3 Enineering - RedPacket Security

An unauthenticated attacker can trick a local user into executing arbitrary commands by opening a deliberately manipulated project file with an affected

RedPacket Security
Chucked in a new SSD and got Debian running on this cute lil #beckhoff PC. Gonna make it a nice part of my compact portable #ethercat test bench I think.

After having worked with #Beckhoff #TwinCAT for a few weeks, I can honestly say that this has been, by far, the worst development experience I have ever had.

- Forget about all the Git functionality, have fun merging things like a caveman
- Let's cache everything, what can probably go wrong (Git clean is my best friend now)
- My definition of slow has been redefined forever
- Stuff will randomly break, thanks to terrible caching and awful Git integration
- I hope you like XML

TIL #Beckhoff has a #Berlin office. #FreeBSD

#FreeBSD 14 geht in die Beta Phase. Interessant sind die kommenden Änderungen und wer sie alles gesponsert hat. FreeBSD ist sehr lebendig und erfreut sich guter Unterstützung:

https://www.beckhoff.com/de-de/produkte/ipc/betriebssysteme-und-tools/twincat-bsd/

Sponsored by #OPNsense #Beckhoff #Dell #Zenarmor #Klara #Google #Netflix #Intel #Netgate #Microsoft

https://www.freebsd.org/releases/14.0R/relnotes/

TwinCAT/BSD: Betriebssystem für Industrie-PCs

TwinCAT/BSD für Beckhoff-Industrie-PCs kombiniert die TwinCAT Runtime mit FreeBSD, einem industriell erprobten Open-Source-Betriebssystem.

Beckhoff Automation