home.social

#hardware-security — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #hardware-security, aggregated by home.social.

fetched live
  1. Interesting work on AMD SEV-SNP by Benedict Schlüter, Christoph Wech and @Shweta: fabricked-attack.github.io/

    By reconfiguring data fabric routing from the untrusted, hypervisor-controlled UEFI firmware, they redirect Platform Security Processor (PSP) memory accesses, compromising SEV-SNP initialization, particularly the Reverse Map Table (RMP).

    #Fabricked #sevsnp #security #hardwaresecurity #confidentalcomputing

  2. Caetra new release v1.2.0; added new shield that reacts when a webcam turns it on/off.

    With this shield we are trying to avoid privacy leaks from you and others, among possible security visual breaches like harvesting information about your surroundings. Do not forget to cover your webcam with a nice cat sticker :3

    github.com/carvilsi/caetra

    #physicalSecurity #physicalAttacks #linuxhardening #hardwareSecurity #bpf #ebpF #bcc

  3. Was für ein unbeschreibliches Gefühl! 📦📚

    Nach über acht Monaten intensiver Arbeit, unzähligen Tassen Schwarztee und Club-Mate-Flaschen war es heute so weit: Der Postbote stand vor der Tür und überreichte mir die allerersten Autorenexemplare meines ersten eigenen englischsprachigen Buches!

    „Hacking Hardware: The Practical Guide to Penetration Testing and Prevention” ist nun offiziell bei Rheinwerk Publishing in den USA erschienen. Es physisch in den Händen zu halten, durch die frisch gedruckten Seiten zu blättern und das eigene Cover zu sehen, ist ein absoluter Meilenstein für mich.

    #HackingHardware #Pentesting #Cybersecurity #InfoSec #HardwareSecurity #RheinwerkPublishing #AuthorLife

  4. Leanpub Book LAUNCH 🚀 Code, Chips and Control: The Security Posture of Digital Isolation by Sal Kimmich

    Through the lens of the top 100 hacks since 1985, learn cybersecurity through real-world examples of what went wrong to convince us of “best practices".

    Watch on our blog here:

    leanpub.com/blog/leanpub-book-

    #books #leanpublishing #selfpublishing #booklaunch #cybersecurity #infosec #securityarchitecture #supplychainsecurity #opensource #devsecops #hardwaresecurity #softwaresecurity #zerotrust

  5. Every modern system carries a tiny vault called a TPM—Trusted Platform Module.
    It protects encryption keys and validates your system at boot.
    TPM is now required for Windows 11, making firmware vigilance more critical than ever.
    Even trusted hardware needs updates.
    Trust, but patch.
    #CyberSecurity #HardwareSecurity #Privacy #B2B

  6. Firmware is low-level code that powers everything from routers to laptops.
    It’s invisible, vital—and often ignored.
    Unpatched firmware can expose known vulnerabilities for years.
    ✅ Check vendor updates
    ✅ Enable secure boot
    ✅ Replace hardware with signed firmware support
    Security starts below the OS.
    #CyberSecurity #HardwareSecurity #B2B

  7. 🖥️ Data doesn’t vanish when you hit delete.

    Proper hardware disposal is a compliance act—GDPR & ISO 27001 both demand secure data destruction.

    That means:
    • Cryptographic wipes
    • Degaussing or shredding
    • Verified certificates of destruction

    Compliance isn’t digital-only.

    #Privacy #HardwareSecurity #DataProtection #GDPR #B2B

  8. 📢New in our Research-Blog: A Tale of Practical Keylogger Forensics

    On a recent engagement, an interesting hardware side quest popped up.
    A client had found a #keylogger and, naturally, Cass Rebellin and @jrt wanted to know what the adversary had seen and if they could gather any useful traces towards the perpetrator.
    The full story 👉research.hisolutions.com/2025/

    #ResearchBlog #DFIR #HardwareSecurity

  9. One of our founding directors, Mike Eftimakis, sat down with Akshaya Asokan from Information Security Media Group (ISMG) to explore how CHERI is helping tackle one of cybersecurity’s biggest challenges: memory safety.

    CHERI (Capability Hardware Enhanced RISC Instructions) is a hardware-based approach to security, designed to prevent around 70% of today’s common vulnerabilities. Backed by industry leaders and the UK government, we're working to ensure global adoption across the electronics supply chain.

    Watch the interview to learn more about:

    💠 How CHERI addresses memory safety issues
    💠 Common hardware supply chain vulnerabilities
    💠 Progress on adoption by chipmakers
    💠 Scalability challenges associated with CHERI

    🎥 Watch the full interview: bankinfosecurity.com/uks-cheri

    #CHERI #CyberSecurity #HardwareSecurity #MemorySafety #SecurityByDesign #InfoSec

  10. 🔧 Right to repair, but not to fix security?

    Framework’s philosophy empowers users to open, upgrade, and repair their devices. But with great openness comes a security catch.

    On the Framework 13, pressing the chassis intrusion switch 10 times resets the BIOS, removing passwords, Secure Boot, and more.

    We flagged this to Framework. Their response?
    "It's a feature..."

    That’s risky. This reset might help with recovery, but it also hands an attacker physical access to critical settings.

    Kieran explains the issue, what this means for security, and how to protect your device.

    📌Read here: pentestpartners.com/security-b

    #RightToRepair #HardwareSecurity #FrameworkLaptop #BIOSReset #SecurityByDesign #CyberSecurity