#FirmwareSecurity

Finite StateFiniteState
2025-06-27

If itโ€™s not in the manifest, most tools wonโ€™t catch it. But unreferenced or outdated components can still be present & exploitable.

Watch this clip from our latest webinar to learn more, & catch the full conversation here ๐Ÿ‘‰ info.finitestate.io/the-future

Finite StateFiniteState
2025-06-18

Most tools rely on declarations.

Finite State looks at whatโ€™s actually on the device & how it behaves.

๐Ÿ“ฝ๏ธ Catch this moment from our webinar to see how execution-aware analysis changes the game.

info.finitestate.io/the-future

2025-06-11

Two days until #BSidesBoulder25 and only 15 tickets remain! Today we highlight, two #BSidesBoulder25 talks: Andrew Brandt's "Smashing Smishing by Quashing Quishing" and Eric Harashevsky's "Firmware Readout Bypass in STM92 (Don't put this in an alarm control panel).

Andrew's talk will examine QR-based phishing attacks, how attackers are exploiting QR codes and SMS to steal credentials and MFA tokens, and how a cross-industry collaboration between mobile vendors, telcos, and the infosec community could finally slam the door on mobile phishing. Think SafeBrowsing, but for QR scans! And we promise that our BSidesBoulder event QR codes will not redirect you to an Andrew-controlled C2 server.

Eric's talk will explore his adventure tinkering with an old STM92's firmware - the talk will explore his findings, reverse engineering the legacy microcontroller, bypassing firmware protections, and what that means for devices still hanging on your wall! Expect a live demo that is sure to excite your future hardware hacking journey.

#BSides #BSidesBoulder #CyberSecurity #Quishing #Smishing #MobileSecurity #PhishingDefense #HardwareHacking #FirmwareSecurity

Check out our full schedule at bsidesboulder.org/schedule/

Tickets are available for purchase for our 13 June event here: eventbrite.com/e/bsides-boulde

Finite StateFiniteState
2025-05-28

Missed our webinar last week?

Watch the on-demand recording of โ€œThe Future of IoT Security โ€“ A Modern Approach to Scanningโ€ now โ†’ info.finitestate.io/the-future

Finite StateFiniteState
2025-05-20

We're honored to be featured in Omdiaโ€™s latest report spotlighting the leaders in firmware & ๐ŸŽ‰

Read the full report to explore what sets us apart ๐Ÿ‘‰ omdia.tech.informa.com/om12971

Finite StateFiniteState
2025-05-15

Traditional tools miss the real IoT risks.

Weโ€™re breaking it all down in our next webinar: The Future of IoT Security lnkd.in/g8-ntqY5

Cue Larry Pesce, VP of Services, & unofficial ๐Ÿ‘‘ of webinars, to tell you more.

Viktor Peterssonvpetersson@hachyderm.io
2025-05-07

What does it really take to build secure, auditable firmware today?

In the latest episode of Nerding Out with Viktor, I sat down with Joshua Watt (Garmin) and Ross Burton (ARM) to dig into how the Yocto Project, SBOMs, and SPDX 3.0 are changing how we ship and maintain embedded Linux at scale.

We get into:
*Why SBOMs need to be generated at build-time, not after
*How SPDX 3.0 helps with license clarity and deep package tracking
*Why VEX metadata matters when itโ€™s time to triage real vulnerabilities
*Build determinism, OTA failures, and surviving 15-year product lifecycles
*What the Cyber Resilience Act means for your toolchain

Whether youโ€™re deep in firmware or just trying to ship connected products without getting buried in compliance debt, this oneโ€™s worth a listen.

Listen here: vpetersson.com/podcast/S02E09.

#Yocto #EmbeddedLinux #SBOM #SPDX #FirmwareSecurity

BIOS level hacking has always been one of the stealthiest and most dangerous forms of attack. Operating beneath the OS, malware embedded in firmware can survive drive wipes and reinstalls. While rare, these attacks are very real. From state actors using BIOS implants for espionage to researchers demonstrating how firmware can be weaponized, this layer is often ignored until it is too late. Projects like Libreboot and Coreboot aim to replace proprietary firmware with open alternatives, giving users more control and reducing the risk of hidden vulnerabilities.

#FirmwareSecurity #BIOSHacking #Coreboot #Libreboot #CyberSecurity #LowLevelThreats #OpenSourceSecurity

Pen Test PartnersPTP@infosec.exchange
2025-03-31

Released by Intel in 1998, IPMI is a hardware management interface operating independently of the OS. Our latest blog post by Kieran looks at INTEL IPMI vulnerabilities and how to mitigate them.

Vulnerabilities include authentication bypasses, credential leaks, and buffer overflows, particularly in Supermicro systems.

โžก๏ธpentestpartners.com/security-b

#IPMI #CyberSecurity #BMCsecurity #Supermicro #VulnerabilityManagement #FirmwareSecurity

PiEmbSysTechpiembsystech
2025-03-28

๐Ÿ”’ Secure & Immutable: The Role of ROM Bootloaders in Embedded Systems
๐Ÿ”— Read more on Piembsystech: piembsystech.com/rom-bootloade

๐Ÿ“– Piembsystech โ€“ The Open Source Learning Platform for engineers, professionals, and students. Share knowledge, explore tech, and grow together! ๐Ÿš€

2025-02-18

@novacustom

Grateful to NovaCustom for their generous financial contribution and collaboration to integrate Heads firmware into their hardware offerings.

This partnership highlights the growing adoption of Heads as a trusted solution for secure boot verification and tamper detection.

Looking to adapt Heads to your specific needs? Explore our consultation services: osresearch.net/Consultation-Se

Want hardware preflashed with Heads? Check out our trusted vendors: osresearch.net/Vendors/

#OpenSource #FirmwareSecurity #Heads #linuxboot #firmware #cybersecurity #qubesos #linux #security #coreboot

RE//verse ConferenceREverseConf@infosec.exchange
2025-01-28

Rehost embedded ARM firmware at near-native speeds! Lukas Seidel (@pr0me) introduces SAFIREFUZZ, achieving 690x fuzzing throughput with ARM Cortex-M firmware. Dive into instruction rewriting, emulation, and performance gains. re-verse.sessionize.com/sessio #REverse2025 #Fuzzing #FirmwareSecurity

RE//verse ConferenceREverseConf@infosec.exchange
2025-01-27

Bootkits: the ultimate stealth threat. Takahiro Haruyama shares cutting-edge techniques to detect UEFI implants with code behavior analysis, YARA/FwHunt rules, and retrohunts. Learn how 6 new bootkits were uncovered! re-verse.sessionize.com/sessio #REverse2025 #FirmwareSecurity #UEFI

2024-09-07

๐ŸŽค Announcing Stuart Yoder's talk at Dasharo vPub: "Security Assessment on Arm Platforms"!

As a System Architect at Arm, Stuart will share insights into security assessments across Arm-based hardware. Considering tools like LFVS HSI and Chipsec, he will discuss ongoing efforts to enhance security evaluation techniques.

๐Ÿ—“๏ธ Sep 12, 20:00 UTC

๐Ÿ“„ More info: buff.ly/3ZbZSTe
๐ŸŽŸ๏ธ Sign up: buff.ly/47dBUJk

#Dasharo #Arm #Security #Firmware #CyberSecurity #Chipsec #FirmwareSecurity

2024-09-06

๐ŸŽค Excited to announce @zaolin 's demo at Dasharo vPub: "@binarly_io Risk Hunt: Finding Firmware Vulnerabilities in the Wild!"

Philipp will showcase the latest updates to Binarly's Risk Hunt platform and demonstrate its capabilities for analyzing and identifying vulnerabilities in various firmware images.

๐Ÿ—“๏ธ Sep 12, 19:00 UTC

๐Ÿ“„ More info: buff.ly/4dPT6af
๐ŸŽŸ๏ธ Sign up: buff.ly/47dBUJk

#Dasharo #FirmwareSecurity #Binarly #RiskHunt #CyberSecurity #Firmware

2024-07-15

Check out Krystian Hebel's latest blog post on the 3mdeb site, detailing how the TwPM (Trustworthy Platform Module) is tested. This in-depth article covers the project's progress, testing methodologies, and future goals. Itโ€™s a must-read for anyone interested in open-source firmware, hardware security, and TPM technology.

blog.3mdeb.com/2024/2024-01-31

#TwPM #TPM #FirmwareSecurity #3mdeb #OpenSource #HardwareSecurity #Testing

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst