๐Ÿข ๐—Ÿ๐—ฎ๐˜๐—ฒ๐˜€๐˜ ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—ต๐—ฎ๐˜€ ๐—ฏ๐—ฒ๐—ฒ๐—ป ๐—ฑ๐—ฟ๐—ผ๐—ฝ๐—ฝ๐—ฒ๐—ฑ! ๐Ÿ‘‡

This week, Jose Miguel Parrella evaluates an embedded security book, ๐™€๐™ฃ๐™œ๐™ž๐™ฃ๐™š๐™š๐™ง๐™ž๐™ฃ๐™œ ๐™Ž๐™š๐™˜๐™ช๐™ง๐™š ๐˜ฟ๐™š๐™ซ๐™ž๐™˜๐™š๐™จ by Dominik Merli...

๐Ÿ“ Check out Jose's full review: https://cybercanon.org/engineering-secure-devices/

#CybersecurityBooks #EmbeddedSecurity | @jmp

Just presented at #39C3: Xous by Bunnie Huang & Sean Cross. A pure-Rust microkernel on RISC-V with a real MMU, strong isolation, and quasi-open silicon. Finally a usable embedded security stack, from hardware to OS.
#Rust #RiscV #EmbeddedSecurity #OpenHardware #IoT #Microkernel https://media.ccc.de/v/39c3-xous-a-pure-rust-rethink-of-the-embedded-operating-system#t=25
Xous: A Pure-Rust Rethink of the Embedded Operating System

media.ccc.de
๐Ÿ”Ž CVE-2025-11544 (CRITICAL, CVSS 9.5): Sharp Display Solutions projectors let attackers upload unauthorized firmwareโ€”remote, no auth needed. All models vulnerable. Urgently segment, restrict, and monitor! https://radar.offseq.com/threat/cve-2025-11544-cwe-912-hidden-functionality-in-sha-156315c0 #OffSeq #CVE2025 #infosec #embeddedsecurity

๐—œ๐—ป๐˜๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐˜„๐—ถ๐˜๐—ต ๐˜๐—ต๐—ฒ ๐—–๐˜‚๐—ฟ๐—ฎ๐˜๐—ผ๐—ฟ๐˜€ ๐—ผ๐—ณ ๐˜๐—ต๐—ฒ ๐—ก๐—ฒ๐˜„ ๐—–๐—ฃ๐—ฆ๐—”-๐—” ๐— ๐—ผ๐—ฑ๐˜‚๐—น๐—ฒ ๐—˜๐— ๐—•๐—˜๐——๐——๐—˜๐——๐—ฆ๐—˜๐—–! ๐Ÿ”

We spoke with Felix Brรคunling and Isabella Stilkerich about the new Advanced Level module #EmbeddedSecurity for Architects. They share why embedded security matters, how safety and security intersect, and which skills architects need to design secure embedded systems.

Dive into the full interview ๐Ÿ‘‰ https://t1p.de/k3rzl

#CPSA #AdvancedLevel #SoftwareArchitecture #EMBEDDEDSEC #SecurityByDesign #EmbeddedSystems #iSAQB

Weโ€™re excited to introduce our newest #CPSA #AdvancedLevel module: EMBEDDEDSEC โ€“ Embedded Security for Architects! ๐Ÿฅณ

This module provides software architects with essential knowledge to design secure and trustworthy embedded system architectures. Participants learn how to identify protection-worthy assets, derive security goals, and select effective control measures. ๐Ÿ”

Learn more ๐Ÿ‘‰ https://t1p.de/kl41w

#SoftwareArchitecture #EmbeddedSecurity #EMBEDDEDSEC #EmbeddedSystems #iSAQB

Embedded systems are everywhere โ€“ and highly attractive targets for attackers. ๐Ÿ˜ฑ

In this #SAGconf session, Lorenz Pfeuffer and Felix Brรคunling give an insight into the new #iSAQB Embedded Security curriculum, showing how to identify risks, choose effective countermeasures, and design more secure embedded systems.

Learn more about this session ๐Ÿ‘‰ https://t1p.de/eztdg

#SAG2025 #SoftwareArchitecture #EmbeddedSecurity #CyberSecurity #EmbeddedSystems

Virtualization on ARMv8-M with the CROSSCON hypervisor running Zephyr RTOS and a TLS client.
The demo on LPCXpresso55S69 showcases a secure TLS application setup ready for 2FA integration.

Watch here ๐Ÿ‘‰ https://youtu.be/GpKOEpA1aTQ?si=3hc8Hb-N_WUlhVfK
#Zephyr #ARMv8M #TLS #RTOS #EmbeddedSecurity #CROSSCON

CROSSCON UC1-1: PUF based authentication demo

YouTube

We're honored to welcome F-Secure Corporation to ITSPmagazine and add them to the incredible lineup of clients we've created content with.

Sean Martin, CISSP and I had a fascinating conversation with Dmitri Vellikok about F-Secure's transformation from traditional #endpointsecurity to something far more ambitious: predicting #scams before they happen.

"How F-Secure Transformed from Endpoint Security to Predicting Scams Before They Happen"

Here's what caught my attention: 70% of people believe they can easily spot scams, yet 43% of that same group admits to being scammed. This disconnect drives F-Secure's approach to embedded, invisible #infosecurity that doesn't rely on consumer vigilance.

The company holds 55% global market share in operator-delivered consumer security, partnering with telecom providers to embed protection directly into networks and applications.

Their "scam kill chain" framework protects consumers at every stage of fraudulent attempts, and they're using AI to predict threats 18-24 months ahead.

Dmitri's insight: "Consumers don't really care or want to understand what the problem with #cybersecurity is. They just want the problems to go away."

Sometimes the best security is the kind you never have to think about.

Full audio interview: https://itspradio.com/episodes/how-f-secure-transformed-from-endpoint-security-to-predicting-scams-before-they-happen-a-brand-story-conversation-with-dmitri-vellikok-product-and-business-development-at-f-secure

Company directory available at ITSPmagazine.com

Watch the Full Video and subscribe to our Fast Growing YouTube Channel

https://youtu.be/zDQlWUmCLk8

#FSecurity #Infosec #EmbeddedSecurity #ITSPmagazine #BrandStories #tech #technology #contentmarketing

How F-Secure Transformed from Endpoint Security to Predicting Scams Before They Happen | A Brand Story Conversation with Dmitri Vellikok, Product and Business Development at F-Secure | ITSPmagazine

Dmitri Vellikok from F-Secure reveals how the company transformed from traditional endpoint security to predicting scams before they happen. With 55% global market share in operator-delivered security, F-Secure has moved beyond asking consumers to install security software to embedding protection directly into telecom networks and applications.

ITSPmagazine
Why do 5-cent chips in your car matter more than you think? ๐Ÿš™๐Ÿ’ฐ Erik Hosler told me how his company can now secure even the cheapest microcontrollers that our lives depend on daily, without adding cost or complexity. #EmbeddedSecurity #IoTSafety