How? Through the Single Reporting Platform.
Starting when? September 11, 2026. Yes, this year.
Link to the FAQ: www.enisa.europa.eu/topics/produ...
How? Through the Single Reporting Platform.
Starting when? September 11, 2026. Yes, this year.
Link to the FAQ: www.enisa.europa.eu/topics/produ...
A device leaves your factory. Years later, it is resold, returned, or thrown away. And yet, on many products, sensitive data is still there.
All of our challenges: ygreky.com/challenge/
A device leaves your factory. Years later, it is resold, returned, or thrown away. And yet, on many products, sensitive data is still there.
All of our challenges: ygreky.com/challenge/
Your task for this week: review the "private" networks your devices rely on. Are they truly private? And even if they are, how do you protect the device when someone plugs a modem into the network?
Your task for this week: review the "private" networks your devices rely on. Are they truly private? And even if they are, how do you protect the device when someone plugs a modem into the network?
ygreky.com/2025/12/yoct...
ygreky.com/2025/12/yoct...
👉 The Embedded Security Challenge for this week: create or review your release storage. Make sure every single component you ship is recorded and stored.
👉 The Embedded Security Challenge for this week: create or review your release storage. Make sure every single component you ship is recorded and stored.
docs.google.com/forms/d/e/1F...
docs.google.com/forms/d/e/1F...
More details and registration links on blogs.eclipse.org/post/marta-r...
More details and registration links on blogs.eclipse.org/post/marta-r...
It is for:
- embedded developers (Linux or any RTOS)
- people working for "manufacturers"
The schedule: fosdem.org/2025/schedul...
It is for:
- embedded developers (Linux or any RTOS)
- people working for "manufacturers"
The schedule: fosdem.org/2025/schedul...
Me: There's a serious problem here, so let's plan for a week of debugging.
Me: There's a serious problem here, so let's plan for a week of debugging.
How do attackers get into a router or an industrial device? Not by the primary function but by the web application you can use to monitor and administer the device.
Check the challenge at ygreky.com/challenge/
How do attackers get into a router or an industrial device? Not by the primary function but by the web application you can use to monitor and administer the device.
Check the challenge at ygreky.com/challenge/
ygreky.com/challenge/
ygreky.com/challenge/