top of page
Welcome To The Embedded Product Cybersecurity News Center



Exposing a Critical, Systemic Flaw in JWT: Introducing the 'Back to the Future' Attack
In this blog we summarize our research paper in which we expose a critical, systematic flaw in JWT: Introducing the 'Back to the Future' Attack
Security Pattern Office
7 days ago


Security Pattern Releases Powerful ARIANNA Platform Update
In this post, we summarize the new ARIANNA features just released to all our customers: Improved Prioritization Mechanism based on Exploitability, New User Notification System, Comprehensive and Customizable Exports for Compliance, including VEX reports, and more.
Security Pattern Office
Aug 14


The Emergence of Quantum Computers and Their Impact on the Security of Embedded Devices
In this blog post, we will explore the fundamental principles of quantum computers, including an overview of Grover’s and Shor’s algorithms, and why they pose a risk to today’s cryptographic systems.
Maria Chiara Molteni
Jul 24


The Five Essential Self-Assessment Activities for RED DA Compliance
This blog explains the activities needed for carrying out the RED DA self-assessment: risk assessment, conceptual and functional tests, gap analysis, and vulnerability assessment.


What Manufacturers Must Do to Meet EN 18031 (RED DA) Vulnerability Management Requirements
This blog explains the vulnerability management requirements of the EN 18031 standard in great detail. Starting August 1, 2025, the cybersecurity requirements of the RED Delegated Act (RED DA) will become mandatory for all radio internet-connected devices placed on the EU market - Are you ready?
Arianna Gringiani
Apr 30
bottom of page