reverse engineering

RL SSCSR Feature Image

Report: Epidemic of Flaws in Commercial and Open Source Code

ReversingLabs’ 2025 Software Supply Chain Security Report finds that security flaws in commercial and open source code are epidemic as hackers target supply chains including those for cryptocurrency and AI in a play for access to sensitive data and IT assets.

Robot Vacuum Liberation

Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement

Security researcher and IoT hacker Dennis Giese talks about his mission to liberate robot vacuums from the control of their manufacturers, letting owners tinker with their own devices and – importantly – control the data they collect about our most intimate surroundings.

Podcast: Craig Smith of OpenGarages on Vehicle Security and GM’s Bug Bounty

In-brief: In this podcast, Paul speaks with Craig Smith of Open Garages on GM’s bounty program, the state of connected vehicle security, and what the auto industry can learn from open source. 

Firm: Two iOS Exploits Could Qualify for $1 Million Bounty

In-brief: One team qualified for the $1 million bounty for a working, remote exploit or jailbreak for devices running Apples iOS 9 operating system, according to the security firm Zerodium. A second may also qualify for at least a partial bounty. However, Apple may only be informed of the holes at a later date. 

Researcher: Drug Pump the ‘Least Secure IP Device I’ve Ever Seen’

In-brief: A researcher studying the workings of a wireless-enabled drug infusion pump by the firm Hospira said the device utterly lacked security controls, making it “the least secure IP enabled device” he had ever worked with. His research prompted a warning from the Department of Homeland Security.