A Guide to Assessing Security Risk in Embedded & IoT Devices

A Guide to Assessing Security Risk in Embedded & IoT Devices

In 2025, a stack-based buffer overflow vulnerability (CVE-2025-24132) was found in the Apple AirPlay SDK. For third-party smart speakers and receivers, this vulnerability allowed proof-of-concept zero-click remote code execution (RCE) […]

Embedded Command Line Interfaces and Why You Need Them

Embedded Command Line Interfaces and why you need them Featured Categories Our Engineers Security Embedded CI All Categories Recent Posts By: Joe Perrin During the course of development – from prototyping hardware through manufacturing – it becomes necessary to run test code over and over to verify functionality or perform system-level testing. This…

On-Demand Webinar: Part 3 – CVE Scanning

On-Demand Webinar: Part 3 - CVE Scanning

In this session of the Automating Reliability Engineering with EmbedOps webinar series, we add automated CVE scanning and SBOM generation to the pipeline—closing the final gap between functional testing and […]

On-Demand Webinar: Part 2 – DFU & HIL Testing

On-Demand Webinar: Part 2 - DFU & HIL Testing

In Part 2 of the Automating Reliability Engineering with EmbedOps webinar series, we move beyond unit testing and introduce hardware-in-the-loop (HIL) testing to expose real-world failures before deployment. Using a […]