Marta Rybczynska
@mrybczyn.bsky.social
📤 32
📥 13
📝 13
Talking about open source security & tech. Founder of Ygreky
https://ygreky.com/
What does your factory reset actually wipe? Have you ever checked? A device leaves your factory. Years later, it is resold, returned, or thrown away. And yet, on many products, sensitive data is still there. All of our challenges:
ygreky.com/challenge/
4 days ago
0
0
0
Today is Thursday, the day of the Embedded Security Challenge. Your task for this week: review the "private" networks your devices rely on. Are they truly private? And even if they are, how do you protect the device when someone plugs a modem into the network?
23 days ago
0
0
0
The Yocto Project Virtual Summit 2025.12 wrapped up last week with three days of great content. The new security track worked especially well (in my opinion), with strong interest in CVE-related tooling, secure boot, and vulnerability reporting.
ygreky.com/2025/12/yoct...
24 days ago
0
1
0
Solid embedded teams keep track of everything they deliver: hardware, software, and configuration. Every time they deliver. 👉 The Embedded Security Challenge for this week: create or review your release storage. Make sure every single component you ship is recorded and stored.
26 days ago
0
0
0
We are running research on what embedded developers actually need for vuln management, which tools they use today, and which ones they would like to use in the future. The survey is open until the end of December 2025, and the results will be published in January.
docs.google.com/forms/d/e/1F...
loading . . .
Next generation vulnerability checking and management tool for embedded - survey
This form aims at collecting requirements and needs of all interested developers and embedded companies to find out what the exact needs in the field are. Thank you!
https://docs.google.com/forms/d/e/1FAIpQLSeoEJQ4R2AmIfROHXZM-wRT4Mf6D0j8BNUyRKktmKo9kZprzQ/viewform
about 1 month ago
0
0
0
I am happy to announce two upcoming webinars on the Cyber Resilience Act for embedded developers. Many of you have asked for a condensed overview of the CRA and an update on where things stand after the recent waves of public reviews. Here it comes. All details here:
ygreky.com/2025/12/unde...
loading . . .
Understanding the Cyber Resilience Act – Ygreky
https://ygreky.com/2025/12/understanding-the-cyber-resilience-act/
about 1 month ago
0
1
0
On June 3rd and 10th with my colleagues from the Eclipse Foundation we will be running a free security training on vulnerability management and related subject. More details and registration links on
blogs.eclipse.org/post/marta-r...
loading . . .
Announcing Security Training on Vulnerability Management, SBOM and related subjects
Do you want to know more about
https://blogs.eclipse.org/post/marta-rybczynska/announcing-security-training-vulnerability-management-sbom-and-related
7 months ago
0
2
1
VulnCon is a quite unique conference focus on software (and not only) vulnerability management. It is happening at the beginning of April and I will be speaking twice.
10 months ago
0
3
1
We're organizing a BoF on the CRA (Cyber Resilience Act) conformance by embedded vendors on Sunday 2nd February 2025 at FOSDEM! Join us at 14h in H.3244. It is for: - embedded developers (Linux or any RTOS) - people working for "manufacturers" The schedule:
fosdem.org/2025/schedul...
loading . . .
https://fosdem.org/2025/schedule/event/fosdem-2025-6764-making-embedded-product-cra-compliant/
11 months ago
0
0
0
Monday morning: Last week's code is working on the first run and passing tests. Me: There's a serious problem here, so let's plan for a week of debugging.
12 months ago
0
0
0
The second week of our embedded security challenge has started. How do attackers get into a router or an industrial device? Not by the primary function but by the web application you can use to monitor and administer the device. Check the challenge at
ygreky.com/challenge/
12 months ago
0
0
0
Embedded Security Challenge week 1 (until Jan 9, 2025): What are your product's services (applications, daemons) communicating, or potentially communicating with the Internet? Check all network interfaces. Also, check for both applications sending data and those listening.
ygreky.com/challenge/
12 months ago
0
0
0
Hello world!
about 1 year ago
0
1
0
you reached the end!!
feeds!
log in