Security Highlight

Security Highlight: Is AI ready for finding security vulnerabilities?

Security Highlight: Is AI ready for finding security vulnerabilities?

Big Sleep's breakthrough in discovering an SQLite vulnerability demonstrates how AI can reduce the opportunity window for attackers, marking a new era in vulnerability research.
Security Highlight: China’s Quantum Leap, and Why RSA Isn’t at Risk (Yet)

Security Highlight: China’s Quantum Leap, and Why RSA Isn’t at Risk (Yet)

Recent headlines suggested that Chinese scientists have the potential to break military-grade RSA encryption using quantum computers, causing concerns over online data security.
Security Highlight: Side-Channel Vulnerability in Infineon Cryptographic Library

Security Highlight: Side-Channel Vulnerability in Infineon Cryptographic Library

Reading the EUCLEAK paper provides a detailed journey through the ups and downs of carrying out a blackbox attack.
Security Highlight: Backdoor Key Found in MIFARE Classic Cards

Security Highlight: Backdoor Key Found in MIFARE Classic Cards

A recent discovery by security researcher Philippe Teuwen and the Proxmark3 community has revealed a significant backdoor in several widely used MIFARE Classic RFID cards.
Security Highlight: Understanding Fault Injection in Neural Networks for Edge Devices

Security Highlight: Understanding Fault Injection in Neural Networks for Edge Devices

This blog post discusses the challenges of extending device security concepts to cover neural networks.
Security Highlight: The Potential Impact of Hardware Security Weaknesses

Security Highlight: The Potential Impact of Hardware Security Weaknesses

This security highlight discusses the recent NIST report on hardware weaknesses, relating to Riscure's experience in the field. 
Security Highlight: The impact of the XZ backdoor. Can we still trust open source?

Security Highlight: The impact of the XZ backdoor. Can we still trust open source?

Marc Witteman talks about a recent attack on an open source package and evaluates the possibility of planting malicious functionality in hardware.
Security Highlight: Unveiling EM Eye – a new vulnerability in embedded cameras

Security Highlight: Unveiling EM Eye – a new vulnerability in embedded cameras

This security highlight discusses the recent EM Eye vulnerability discovery, its practical implications, challenges, and potential countermeasures.
Security Highlight: Post-Quantum Cryptography on Embedded: challenges and opportunities

Security Highlight: Post-Quantum Cryptography on Embedded: challenges and opportunities

We are moving to an era where quantum computing threatens the confidentiality of current cryptographic protocols, specifically around "harvest now, decrypt later" attacks: the ability to store ...
Security Highlight: Is AI ready for finding security vulnerabilities?

Security Highlight: Is AI ready for finding security vulnerabilities?

Big Sleep's breakthrough in discovering an SQLite vulnerability demonstrates how AI can reduce the opportunity window for attackers, marking a new era in vulnerability research.
Security Highlight: China’s Quantum Leap, and Why RSA Isn’t at Risk (Yet)

Security Highlight: China’s Quantum Leap, and Why RSA Isn’t at Risk (Yet)

Recent headlines suggested that Chinese scientists have the potential to break military-grade RSA encryption using quantum computers, causing concerns over online data security.
Security Highlight: Side-Channel Vulnerability in Infineon Cryptographic Library

Security Highlight: Side-Channel Vulnerability in Infineon Cryptographic Library

Reading the EUCLEAK paper provides a detailed journey through the ups and downs of carrying out a blackbox attack.
Security Highlight: Backdoor Key Found in MIFARE Classic Cards

Security Highlight: Backdoor Key Found in MIFARE Classic Cards

A recent discovery by security researcher Philippe Teuwen and the Proxmark3 community has revealed a significant backdoor in several widely used MIFARE Classic RFID cards.
Security Highlight: Understanding Fault Injection in Neural Networks for Edge Devices

Security Highlight: Understanding Fault Injection in Neural Networks for Edge Devices

This blog post discusses the challenges of extending device security concepts to cover neural networks.
Security Highlight: The Potential Impact of Hardware Security Weaknesses

Security Highlight: The Potential Impact of Hardware Security Weaknesses

This security highlight discusses the recent NIST report on hardware weaknesses, relating to Riscure's experience in the field. 
Security Highlight: The impact of the XZ backdoor. Can we still trust open source?

Security Highlight: The impact of the XZ backdoor. Can we still trust open source?

Marc Witteman talks about a recent attack on an open source package and evaluates the possibility of planting malicious functionality in hardware.
Security Highlight: Unveiling EM Eye – a new vulnerability in embedded cameras

Security Highlight: Unveiling EM Eye – a new vulnerability in embedded cameras

This security highlight discusses the recent EM Eye vulnerability discovery, its practical implications, challenges, and potential countermeasures.
Security Highlight: Post-Quantum Cryptography on Embedded: challenges and opportunities

Security Highlight: Post-Quantum Cryptography on Embedded: challenges and opportunities

We are moving to an era where quantum computing threatens the confidentiality of current cryptographic protocols, specifically around "harvest now, decrypt later" attacks: the ability to store ...