Old drives don’t forget.
Deleting data ≠ destroying it.
Hardware disposal is where privacy meets entropy—wipes, degaussing, and verified destruction all count.
Don’t let yesterday’s server become tomorrow’s leak.
#DataPrivacy #HardwareSecurity #InfoSec #B2B
Deleting data ≠ destroying it.
Hardware disposal is where privacy meets entropy—wipes, degaussing, and verified destruction all count.
Don’t let yesterday’s server become tomorrow’s leak.
#DataPrivacy #HardwareSecurity #InfoSec #B2B
October 6, 2025 at 4:14 PM
Old drives don’t forget.
Deleting data ≠ destroying it.
Hardware disposal is where privacy meets entropy—wipes, degaussing, and verified destruction all count.
Don’t let yesterday’s server become tomorrow’s leak.
#DataPrivacy #HardwareSecurity #InfoSec #B2B
Deleting data ≠ destroying it.
Hardware disposal is where privacy meets entropy—wipes, degaussing, and verified destruction all count.
Don’t let yesterday’s server become tomorrow’s leak.
#DataPrivacy #HardwareSecurity #InfoSec #B2B
A key concern is the absence of detailed technical specifications for ChkTag. Questions loom over its implementation – will it be opt-in or opt-out? This lack of clarity hinders understanding its true impact on performance and compatibility. #HardwareSecurity 3/6
October 22, 2025 at 1:00 AM
A key concern is the absence of detailed technical specifications for ChkTag. Questions loom over its implementation – will it be opt-in or opt-out? This lack of clarity hinders understanding its true impact on performance and compatibility. #HardwareSecurity 3/6
Critical ‘Revault’ Flaws Leaves over 100 Dell Laptop Models Vulnerable if Unpatched
#CyberSecurity #Dell #Vulnerability #Cisco #Firmware #ReVault #HardwareSecurity
winbuzzer.com/2025/08/05/c...
#CyberSecurity #Dell #Vulnerability #Cisco #Firmware #ReVault #HardwareSecurity
winbuzzer.com/2025/08/05/c...
August 5, 2025 at 8:13 PM
Critical ‘Revault’ Flaws Leaves over 100 Dell Laptop Models Vulnerable if Unpatched
#CyberSecurity #Dell #Vulnerability #Cisco #Firmware #ReVault #HardwareSecurity
winbuzzer.com/2025/08/05/c...
#CyberSecurity #Dell #Vulnerability #Cisco #Firmware #ReVault #HardwareSecurity
winbuzzer.com/2025/08/05/c...
🚨 TCHES 2025 Issue 4 Submission Deadline: April 15, 2025!
Submit your research on cryptographic hardware & software to CHES- happening this September in Kuala Lumpur!
More info: ches.iacr.org/2025/callfor...
#CHES2025 #Cryptography #HardwareSecurity #SideChannel #IACR #EmbeddedSystems #CallForPapers
Submit your research on cryptographic hardware & software to CHES- happening this September in Kuala Lumpur!
More info: ches.iacr.org/2025/callfor...
#CHES2025 #Cryptography #HardwareSecurity #SideChannel #IACR #EmbeddedSystems #CallForPapers
April 8, 2025 at 7:23 AM
🚨 TCHES 2025 Issue 4 Submission Deadline: April 15, 2025!
Submit your research on cryptographic hardware & software to CHES- happening this September in Kuala Lumpur!
More info: ches.iacr.org/2025/callfor...
#CHES2025 #Cryptography #HardwareSecurity #SideChannel #IACR #EmbeddedSystems #CallForPapers
Submit your research on cryptographic hardware & software to CHES- happening this September in Kuala Lumpur!
More info: ches.iacr.org/2025/callfor...
#CHES2025 #Cryptography #HardwareSecurity #SideChannel #IACR #EmbeddedSystems #CallForPapers
Skepticism surrounds hardware-based roots of trust (TEEs, vTPMs). Known vulnerabilities mean true data isolation from providers remains complex, especially under physical or state-level attacks. Trusting hardware is a big assumption. #HardwareSecurity 3/6
November 7, 2025 at 11:00 AM
Skepticism surrounds hardware-based roots of trust (TEEs, vTPMs). Known vulnerabilities mean true data isolation from providers remains complex, especially under physical or state-level attacks. Trusting hardware is a big assumption. #HardwareSecurity 3/6
“Destroy data or else”—companies face millions in liability if old laptops aren’t properly wiped. A factory reset isn’t enough. Trust your sanitization process. 💻⚠️ #DataSanitization #HardwareSecurity
Destroy data on old laptops or face major liability
: Doing a simple system reset may not be enough to save you from fines and lawsuits
buff.ly
September 15, 2025 at 6:39 AM
“Destroy data or else”—companies face millions in liability if old laptops aren’t properly wiped. A factory reset isn’t enough. Trust your sanitization process. 💻⚠️ #DataSanitization #HardwareSecurity
New ‘GPUHammer’ attack exploits GPUs to launch Rowhammer-style memory corruption. #GPUHammer #Rowhammer #hardwaresecurity #cybersecurity #infosec thehackernews.com/2025/07/gpuh...
GPUHammer: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs
NVIDIA urges ECC activation to mitigate GPUHammer, a RowHammer exploit threatening AI accuracy and data integrity on GPUs.
thehackernews.com
July 14, 2025 at 7:20 PM
New ‘GPUHammer’ attack exploits GPUs to launch Rowhammer-style memory corruption. #GPUHammer #Rowhammer #hardwaresecurity #cybersecurity #infosec thehackernews.com/2025/07/gpuh...
We’re at Embedded World, drilling into chips and testing MCU security. 🔬
#cybersecurity #hardwaresecurity
#cybersecurity #hardwaresecurity
March 11, 2025 at 10:32 AM
We’re at Embedded World, drilling into chips and testing MCU security. 🔬
#cybersecurity #hardwaresecurity
#cybersecurity #hardwaresecurity
Supply chain vulnerabilities, hardware attacks, and communications hacks are rife. Autonomous technology poses extra threats.
semiengineering.com/security-ris...
#cybersecurity #milaero #aerospace #semiconductor #hardwaresecurity
semiengineering.com/security-ris...
#cybersecurity #milaero #aerospace #semiconductor #hardwaresecurity
Security Risks Mount For Aerospace, Defense Applications
Supply chain vulnerabilities, hardware attacks, and communications hacks are rife. Autonomous technology poses extra threats.
semiengineering.com
May 13, 2025 at 3:54 AM
Supply chain vulnerabilities, hardware attacks, and communications hacks are rife. Autonomous technology poses extra threats.
semiengineering.com/security-ris...
#cybersecurity #milaero #aerospace #semiconductor #hardwaresecurity
semiengineering.com/security-ris...
#cybersecurity #milaero #aerospace #semiconductor #hardwaresecurity
And that's why #HardwareSecurity and #ZeroTrust are your best friends🤝
www.bleepingcomputer.com/news/securit...
www.bleepingcomputer.com/news/securit...
Undocumented "backdoor" found in Bluetooth chip used by a billion devices
The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains an undocumented "backdoor" that could be leveraged for attacks.
www.bleepingcomputer.com
March 8, 2025 at 7:36 PM
And that's why #HardwareSecurity and #ZeroTrust are your best friends🤝
www.bleepingcomputer.com/news/securit...
www.bleepingcomputer.com/news/securit...
The “2025 CWE Most Important Hardware Weaknesses”
cycuity.com/type/blog/th...
#cwe #cybersecurity #infosec #hardwaresecurity #hw #hardware
cycuity.com/type/blog/th...
#cwe #cybersecurity #infosec #hardwaresecurity #hw #hardware
The "2025 CWE Most Important Hardware Weaknesses”
Discover the 2025 most important hardware security weaknesses. Learn how to leverage this list to strengthen your security program.
cycuity.com
August 27, 2025 at 1:28 PM
The “2025 CWE Most Important Hardware Weaknesses”
cycuity.com/type/blog/th...
#cwe #cybersecurity #infosec #hardwaresecurity #hw #hardware
cycuity.com/type/blog/th...
#cwe #cybersecurity #infosec #hardwaresecurity #hw #hardware
Why I Prefer Hardware-based Authentication
A Bit of Security for December 2, 2024
I like hardware-based authentication – when it’s done right. Listen to this -
youtu.be/m3vF3knbzHs?...
#cybersecuritytips #SecureID #hardwaresecurity #authentication #identification #accesscontrol #BitofSec
A Bit of Security for December 2, 2024
I like hardware-based authentication – when it’s done right. Listen to this -
youtu.be/m3vF3knbzHs?...
#cybersecuritytips #SecureID #hardwaresecurity #authentication #identification #accesscontrol #BitofSec
Why I Like Hardware Auth
YouTube video by A Bit of Security, by William J. Malik
youtu.be
December 2, 2024 at 3:14 PM
Why I Prefer Hardware-based Authentication
A Bit of Security for December 2, 2024
I like hardware-based authentication – when it’s done right. Listen to this -
youtu.be/m3vF3knbzHs?...
#cybersecuritytips #SecureID #hardwaresecurity #authentication #identification #accesscontrol #BitofSec
A Bit of Security for December 2, 2024
I like hardware-based authentication – when it’s done right. Listen to this -
youtu.be/m3vF3knbzHs?...
#cybersecuritytips #SecureID #hardwaresecurity #authentication #identification #accesscontrol #BitofSec
Multi-die assemblies enable more analog content, but that adds new security vulnerabilities for which there is little available research.
semiengineering.com/how-secure-a...
#analog #cybersecurity #chiplets #hardwaresecurity #sensors
semiengineering.com/how-secure-a...
#analog #cybersecurity #chiplets #hardwaresecurity #sensors
How Secure Are Analog Circuits?
Multi-die assemblies enable more analog content, but that adds new security vulnerabilities for which there is little available research.
semiengineering.com
June 5, 2025 at 3:31 PM
Multi-die assemblies enable more analog content, but that adds new security vulnerabilities for which there is little available research.
semiengineering.com/how-secure-a...
#analog #cybersecurity #chiplets #hardwaresecurity #sensors
semiengineering.com/how-secure-a...
#analog #cybersecurity #chiplets #hardwaresecurity #sensors
New Hardware Based 'ONEFLIP' Attack Can Hijack BO Models by Flipping a Single Memory Bit
#AI #AISecurity #Potatosecurity #Rowhammer #ONEFLIP #HardwareSecurity
winbuzzer.com/2025/08/25/n...
#AI #AISecurity #Potatosecurity #Rowhammer #ONEFLIP #HardwareSecurity
winbuzzer.com/2025/08/25/n...
August 25, 2025 at 9:39 AM
New Hardware Based 'ONEFLIP' Attack Can Hijack BO Models by Flipping a Single Memory Bit
#AI #AISecurity #Potatosecurity #Rowhammer #ONEFLIP #HardwareSecurity
winbuzzer.com/2025/08/25/n...
#AI #AISecurity #Potatosecurity #Rowhammer #ONEFLIP #HardwareSecurity
winbuzzer.com/2025/08/25/n...
📌 New video from @BlackHatOfficialYT discusses hardware security challenges and solutions. #CyberSecurity #HardwareSecurity https://tinyurl.com/2ysqogo5
Expert Discusses Hardware Security Challenges and Hack@DAC Competition
In this video, Arun, an offensive security expert at Intel, discusses the lessons learned from organizing "Hack@DAC," the world's largest hardware hacking competition. He is joined by his colleagues Harish and Jason, as well as two prominent professors, JV Rajendran from Texas A&M University and Ahmed Sadek from TU Darmstadt in Germany. The team also collaborates with PhD students and industry partners like Synopsys. Arun begins by explaining the main challenges in hardware security: low awareness of hardware weakness types, lack of security tools for hardware, and the high cost of fixing hardware bugs. He emphasizes the importance of detecting and fixing bugs during the RTL (Register Transfer Level) design phase, which is essentially the hardware's source code. To illustrate these challenges, Arun presents a hypothetical System on Chip (SoC) example, showing how security features are implemented in hardware. He provides concrete examples of hardware vulnerabilities, such as flaws in cryptographic key management, and explains how these flaws can be exploited by attackers. He highlights the need to create more security-aware automated design tools to detect these flaws. The video then details the organization of the Hack@DAC competition. The competition is structured in two phases: an offline phase where participants analyze a buggy chip design, and a live phase where finalists use advanced cloud-based tools to detect additional bugs. Participants must identify security flaws, propose mitigations, and evaluate the impact of these flaws, mimicking the work of a full-time security researcher. Arun highlights the benefits of the competition for participants, who gain practical experience in hardware security and develop a hacker mindset. The competition has also created a benchmark for testing hardware security tools, which was previously non-existent. In conclusion, Arun summarizes the key takeaways: raising awareness about hardware security, creating secure automated design tools, and adopting a "shift left" mentality to detect and fix bugs during the design phase. He also mentions the collaboration with MITRE to integrate hardware weaknesses into the Common Weakness Enumeration (CWE), and the positive impacts of the competition on the industry and academia. For more details, watch the full video: https://www.youtube.com/watch?v=IC-BB7HEor8
tinyurl.com
March 10, 2025 at 7:20 PM
📌 New video from @BlackHatOfficialYT discusses hardware security challenges and solutions. #CyberSecurity #HardwareSecurity https://tinyurl.com/2ysqogo5
www.insightsfromanalytics.com/post/black-h... #BlackHat2025 #CyberSecurity #InfoSec #AISecurty #HardwareSecurity #CyberPolicy #BlackHatUSA #LasVegas #CyberThreats #SecurityResearch #CyberConference #TechSecurity
Black Hat USA 2025: Navigating Cybersecurity's Critical Crossroads
Black Hat USA 2025 addresses AI security, hardware vulnerabilities, and policy changes at the cybersecurity industry's most critical annual gathering in Las Vegas.As we approach the 28th anniversary o...
www.insightsfromanalytics.com
June 26, 2025 at 1:30 AM
Part 2 of a roundtable series with 7 experts:
Semiconductor Engineering discussed hardware security challenges, including new threat models from AI-based attacks
semiengineering.com/security-tra...
#HardwareSecurity #semiconductor #AI #AIattacks
Semiconductor Engineering discussed hardware security challenges, including new threat models from AI-based attacks
semiengineering.com/security-tra...
#HardwareSecurity #semiconductor #AI #AIattacks
Security Tradeoffs: A Difficult Balance
Lack of security metrics, and the increasing adoption of chiplets, 2.5D architectures, and AI all complicate security.
semiengineering.com
August 6, 2025 at 3:57 PM
Part 2 of a roundtable series with 7 experts:
Semiconductor Engineering discussed hardware security challenges, including new threat models from AI-based attacks
semiengineering.com/security-tra...
#HardwareSecurity #semiconductor #AI #AIattacks
Semiconductor Engineering discussed hardware security challenges, including new threat models from AI-based attacks
semiengineering.com/security-tra...
#HardwareSecurity #semiconductor #AI #AIattacks
Survey (Sept 2025) finds digital twins verify hardware, providing real‑time integrity checks against piracy, tampering and side‑channel leaks; LLMs boost analysis. Read more: https://getnews.me/digital-twins-boost-hardware-security-amid-growing-threats/ #digitaltwins #hardwaresecurity #ai
September 17, 2025 at 11:44 AM
Survey (Sept 2025) finds digital twins verify hardware, providing real‑time integrity checks against piracy, tampering and side‑channel leaks; LLMs boost analysis. Read more: https://getnews.me/digital-twins-boost-hardware-security-amid-growing-threats/ #digitaltwins #hardwaresecurity #ai
A Keyed Permutor and Watermark Protection Columns protect AI weights in memristive crossbars, adding under 10 % area, delay and power overhead, evaluated on 45 nm, 22 nm and 7 nm nodes. https://getnews.me/new-security-mechanisms-guard-ai-weights-in-memristive-crossbars/ #memristive #hardwaresecurity
October 3, 2025 at 7:38 PM
A Keyed Permutor and Watermark Protection Columns protect AI weights in memristive crossbars, adding under 10 % area, delay and power overhead, evaluated on 45 nm, 22 nm and 7 nm nodes. https://getnews.me/new-security-mechanisms-guard-ai-weights-in-memristive-crossbars/ #memristive #hardwaresecurity
🔒 How secure is your hardware?
Join the TDL Webinar – Hardware Security: Key Challenges & New Directions
📅 Oct 9, 2025 | 16:00 CEST | Online
👉 Register: bit.ly/3VR6SlO
#Cybersecurity #HardwareSecurity #Challenges #Webinar #Trust
Join the TDL Webinar – Hardware Security: Key Challenges & New Directions
📅 Oct 9, 2025 | 16:00 CEST | Online
👉 Register: bit.ly/3VR6SlO
#Cybersecurity #HardwareSecurity #Challenges #Webinar #Trust
Hardware Security - Trust in Digital Life
The TDL webinar autumn series continues with a renewed look at the challenges that have evolved in association with the security of hardware.
bit.ly
October 6, 2025 at 8:56 AM
🔒 How secure is your hardware?
Join the TDL Webinar – Hardware Security: Key Challenges & New Directions
📅 Oct 9, 2025 | 16:00 CEST | Online
👉 Register: bit.ly/3VR6SlO
#Cybersecurity #HardwareSecurity #Challenges #Webinar #Trust
Join the TDL Webinar – Hardware Security: Key Challenges & New Directions
📅 Oct 9, 2025 | 16:00 CEST | Online
👉 Register: bit.ly/3VR6SlO
#Cybersecurity #HardwareSecurity #Challenges #Webinar #Trust
The CHES Challenge is coming back in 2025 with two tracks!
🔬 GE Wars: Test your DL-SCA skills on real-world AES EM traces.
🔧 HACK@CHES'25: Dive into hardware security on a custom OpenTitan SoC.
🔗 ches.iacr.org/2025/challen...
#CHES2025 #SideChannel #HardwareSecurity
🔬 GE Wars: Test your DL-SCA skills on real-world AES EM traces.
🔧 HACK@CHES'25: Dive into hardware security on a custom OpenTitan SoC.
🔗 ches.iacr.org/2025/challen...
#CHES2025 #SideChannel #HardwareSecurity
CHES 2025
Cryptographic Hardware and Embedded Systems
ches.iacr.org
May 19, 2025 at 8:29 AM
The CHES Challenge is coming back in 2025 with two tracks!
🔬 GE Wars: Test your DL-SCA skills on real-world AES EM traces.
🔧 HACK@CHES'25: Dive into hardware security on a custom OpenTitan SoC.
🔗 ches.iacr.org/2025/challen...
#CHES2025 #SideChannel #HardwareSecurity
🔬 GE Wars: Test your DL-SCA skills on real-world AES EM traces.
🔧 HACK@CHES'25: Dive into hardware security on a custom OpenTitan SoC.
🔗 ches.iacr.org/2025/challen...
#CHES2025 #SideChannel #HardwareSecurity
First up in the session was Warnecke et al.'s "Evil from Within: Machine Learning #Backdoors Through Dormant Hardware Trojans," highlighting a novel hardware-based backdoor attack on ML systems without altering model or software. (www.acsac.org/2024/p...) 2/6
#HardwareSecurity
#HardwareSecurity
October 2, 2025 at 3:07 PM
First up in the session was Warnecke et al.'s "Evil from Within: Machine Learning #Backdoors Through Dormant Hardware Trojans," highlighting a novel hardware-based backdoor attack on ML systems without altering model or software. (www.acsac.org/2024/p...) 2/6
#HardwareSecurity
#HardwareSecurity