#firmware-testing

[ follow ]
Software development
fromDevOps.com
3 days ago

Why Code Validation is the Next Frontier - DevOps.com

Shared staging environments are inadequate for modern development; isolated, on-demand setups are needed for effective validation.
DevOps
fromInfoQ
6 days ago

Failure As a Means to Build Resilient Software Systems: A Conversation with Lorin Hochstein

Using software failures can enhance software architecture and reliability engineering practices.
fromMakeUseOf
1 week ago

The hardware upgrade that changed my workflow wasn't a PC part

Finding the right desk and office chair combo can have lasting effects on the quality of your spinal health, and in my case, landing on just the right pairing has boosted my productivity big time.
Gadgets
Software development
fromMedium
3 days ago

Zero-Effort Production Debugging: How I Automated Bug Fixes for My Side Project

Automating bug fixes with an AI agent streamlines maintenance for full-stack applications, enabling zero-effort management of errors.
Women in technology
fromInfoQ
1 week ago

Security and Architecture: To Betray One Is To Destroy Both

Architecture and security have evolved from separate entities to a deeply connected partnership focused on resilience and protection against threats.
fromTheregister
1 week ago

Microsoft cracks down on old Windows kernel drivers

Microsoft is removing trust for kernel drivers that haven't been through the Windows Hardware Compatibility Program, targeting those signed by the long-deprecated cross-signed root program. This change will take effect with the April 2026 Windows Update.
Information security
Gadgets
fromTheregister
1 week ago

Engineer sabotaged PC then complained when it didn't work

Ewen faced challenges with a fiber-optic device that produced faulty data, leading to a long drive to troubleshoot the issue.
#cybersecurity
Privacy professionals
fromWIRED
2 weeks ago

Cyberattack on a Car Breathalyzer Firm Leaves Drivers Stuck

Law enforcement dismantled major botnets while new vulnerabilities and privacy issues in tech continue to emerge, raising concerns over security.
fromThe Hacker News
1 week ago
Information security

TeamPCP Backdoors LiteLLM Versions 1.82.7-1.82.8 Likely via Trivy CI/CD Compromise

TeamPCP compromised the litellm Python package, embedding malicious versions that include a credential harvester and a persistent backdoor.
Privacy professionals
fromWIRED
2 weeks ago

Cyberattack on a Car Breathalyzer Firm Leaves Drivers Stuck

Law enforcement dismantled major botnets while new vulnerabilities and privacy issues in tech continue to emerge, raising concerns over security.
Information security
fromThe Hacker News
1 week ago

TeamPCP Backdoors LiteLLM Versions 1.82.7-1.82.8 Likely via Trivy CI/CD Compromise

TeamPCP compromised the litellm Python package, embedding malicious versions that include a credential harvester and a persistent backdoor.
Node JS
fromDEV Community
2 weeks ago

Why I Stopped Maintaining .env.example by Hand

A new tool automatically discovers environment variables used in Node.js code to prevent stale .env.example files from causing deployment failures.
Photography
fromInfoQ
3 weeks ago

Image Processing for Automated Tests

Image-based test automation using AI algorithms enables testing applications without access to internal states like DOM or component trees, providing visual representations to identify intended versus faulty states.
fromTheregister
1 week ago

Junior disobeyed orders, tried untested feature during demo

Lydia noticed the machine's battery was running low and told two other team members. The more senior went to fetch the backup battery, while the junior team member suggested a quicker method that Lydia firmly rejected.
Gadgets
DevOps
fromDevOps.com
3 weeks ago

The Risk Profile of AI-Driven Development - DevOps.com

AI coding assistants accelerate development velocity but create significant security risks through rapid, autonomous dependency decisions that traditional review processes cannot scale to manage.
Web frameworks
fromMedium
3 weeks ago

My 8-Year-Old Open-Source Project was a Victim of a Major Cyber Attack

A popular open-source project fell victim to a supply-chain attack through a development workflow loophole, threatening years of work and project reputation.
Business
fromHelen Min
1 month ago

Software isn't dying, but it is becoming more honest - Helen Min

SaaS's subscription-based billing model is evolving beyond fixed seat-based pricing toward usage-based and outcome-based billing models that better align costs with actual value delivered.
Software development
fromTheregister
1 week ago

Windows boss promises to heal the operating system's wounds

Microsoft promises improvements to Windows 11, addressing user frustrations with bugs and AI integration, but lacks genuine apologies for past issues.
Information security
fromSecurityWeek
1 week ago

QNAP Patches Four Vulnerabilities Exploited at Pwn2Own

QNAP released patches for multiple vulnerabilities, including four critical issues demonstrated at Pwn2Own 2025 affecting SD-WAN routers.
DevOps
fromDeveloper Tech News
3 weeks ago

BMC: Integrating mainframe systems into modern CI/CD pipelines

Mainframe systems must integrate into modern CI/CD pipelines to accelerate delivery while maintaining reliability, replacing legacy Waterfall approaches that prioritize stability over speed.
#ai-code-generation
Software development
fromTheregister
2 weeks ago

Mistral's new agent proofs your code on the cheap

Mistral's Leanstral uses formal code verification in Lean programming language to improve AI code generation reliability while offering significantly lower costs than competitors like Claude.
Software development
fromDevOps.com
1 month ago

Can QA Reignite its Purpose in the Agentic Code Generation Era? - DevOps.com

AI now generates 41% of all code with 84% of developers adopting it, requiring deterministic execution, isolated environments, and convergent correctness signals for effective agentic QA.
Information security
fromThe Hacker News
2 weeks ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
fromZDNET
1 month ago

Your smart home may be at risk - 6 ways experts protect your devices from attacks

All smart homes are at risk of being hacked, but it's not a likely event. The type of bad actors that target smart homes and devices, such as security cameras, are opportunistic. They search randomly for easy targets -- they don't tend to choose a particular home to attack and then try to circumvent that specific system.
Privacy technologies
Information security
fromThe Hacker News
3 weeks ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
Software development
fromInfoWorld
3 weeks ago

Coding for agents

AI agents reward explicit, consistent, well-documented code over clever or personally-preferred approaches, fundamentally changing software engineering standards toward machine-legibility.
Information security
fromSecurityWeek
3 weeks ago

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric

Industrial control system manufacturers Siemens, Schneider Electric, Mitsubishi Electric, and Moxa released multiple security advisories addressing critical and high-severity vulnerabilities in their ICS products.
Software development
fromTechzine Global
3 weeks ago

The future of generative AI in software testing

Generative AI transforms software testing by automating test cases, generating data, and predicting bugs, but enterprises must validate AI outputs at scale rather than relying on speed alone.
Artificial intelligence
fromDevOps.com
1 month ago

Survey: Adoption of AI Software Testing Slowed by Trust Issues

AI is prioritized for testing but limited trust and maintenance burdens keep most organizations from embedding AI across core test workflows.
Software development
fromFuturism
4 weeks ago

Entirely Vibe-Coded Operating System Is a Bug-Filled Disaster

Vibe-coded software development produces non-functional results, as demonstrated by Vib-OS, an entirely AI-generated operating system that is buggy and largely unusable despite claimed features.
Philosophy
fromMedium
1 month ago

Why code is not the source of truth

Design specifications and blueprints, not implementation code, are the authoritative source of truth; implementation is derived from and judged against originating design authority.
fromArs Technica
1 month ago

What happens to a car when the company behind its software goes under?

As vehicles become platforms for software and subscriptions, their longevity is increasingly tied to the survival of the companies behind their code. When those companies fail, the consequences ripple far beyond a bad app update and into the basic question of whether a car still functions as a car. Over the years, automotive software has expanded from performing rudimentary engine management and onboard diagnostics to powering today's interconnected, software-defined vehicles.
Cars
Information security
fromSecuritymagazine
1 month ago

Would You Trust an AI Pentester to Work Solo?

AI-powered pentesting excels at speed and pattern recognition but requires human guidance to validate contextual vulnerabilities and novel attack paths that matter most to organizations.
Software development
fromDevOps.com
1 month ago

When AI Gets It Wrong: The Insecure Defaults Lurking in Your Code - DevOps.com

Generative AI accelerates code development but introduces security vulnerabilities because AI models learn insecure patterns from training data rather than understanding security principles.
fromSecurityWeek
1 month ago

How to Eliminate the Technical Debt of Insecure AI-Assisted Software Development

This extends to the software development community, which is seeing a near-ubiquitous presence of AI-coding assistants as teams face pressures to generate more output in less time. While the huge spike in efficiencies greatly helps them, these teams too often fail to incorporate adequate safety controls and practices into AI deployments. The resulting risks leave their organizations exposed, and developers will struggle to backtrack in tracing and identifying where - and how - a security gap occurred.
Artificial intelligence
fromDevOps.com
1 month ago

Arcjet SDKs Make It Simpler for Developers to Include Security Functions - DevOps.com

Company CEO David Mytton said the release of v1.0 of its Arcjet JavaScript SDK makes it possible for developers to address many of the issues as applications are being developed that DevOps teams would otherwise need to address later in the software development lifecycle (SDLC). Additionally, Arcjet is beta testing a similar SDK for Python developers, who often have even less application security expertise, added Mytton.
JavaScript
fromwww.sitepoint.com
2 months ago

Software Development

1. What Are the Key Features Every Modern Business Website Should Have Today? Perfect for UX, performance, and custom web development discussion.
Web design
fromInfoWorld
1 month ago

An ode to craftsmanship in software development

Your coding apprentice can build, at your direction, pretty much anything now. The task becomes more like conducting an orchestra than playing in it. Not all members of the orchestra want to conduct, but given that is where things are headed, I think we all need to consider it at least.
Software development
Artificial intelligence
fromInfoQ
1 month ago

Leapwork Research Shows Why AI in Testing Still Depends on Reliability, Not Just Innovation

AI-driven testing is increasingly prioritized, but concerns about accuracy, stability, and manual maintenance limit broad adoption across critical test workflows.
fromSecurityWeek
1 month ago

Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking

According to CISA, Gardyn products were affected by two critical and two high-severity vulnerabilities. One of the critical flaws, tracked as CVE-2025-29631, is a command injection issue that can be exploited to execute arbitrary OS commands on the targeted device. The second critical vulnerability, CVE-2025-1242, is related to the exposure of hardcoded admin credentials that can be used to gain full control of the Gardyn IoT Hub.
Information security
Information security
fromInfoWorld
1 month ago

Three web security blind spots in mobile DevSecOps pipelines

Mobile apps require fundamentally different security approaches than web applications because they operate as untrusted endpoints where attackers have physical access to the binary, making traditional web-centric security models inadequate.
Software development
fromZDNET
1 month ago

Linux explores new way of authenticating developers and their code - here's how it works

The Linux kernel is transitioning from PGP-based developer identification to a more efficient system that addresses privacy concerns and streamlines the cumbersome face-to-face key-signing verification process.
Artificial intelligence
fromEngadget
2 months ago

He could just turn it off

Grok's image-generation continues despite producing sexually exploitative content; Elon Musk can disable the feature and should do so to prevent legal and moral harm.
Gadgets
fromZDNET
2 months ago

7 cool and useful things I can do with my Flipper Zero - as someone who's used it for years

Flipper Zero is a compact, versatile device providing sub-GHz radio, RFID/NFC, iButton, IR, and GPIO capabilities for many legitimate and practical uses.
#distributed-systems
fromInfoQ
1 month ago
Software development

How a Small Enablement Team Supported Adopting a Single Environment for Distributed Testing

fromInfoQ
1 month ago
Software development

How a Small Enablement Team Supported Adopting a Single Environment for Distributed Testing

Gadgets
fromZDNET
2 months ago

Skipping this PC maintenance step could cost you - here's the right way to clean your system

Regular physical and software maintenance preserves desktop performance, prevents heat-related damage, and extends hardware lifespan using inexpensive or free tools.
Gadgets
fromTheregister
2 months ago

Engineer caused data loss by cleaning PCs with welding tools

A structural engineer destroyed five AutoCAD PCs by using oil-laden compressed air and acetone, causing hardware failure and loss of engineering files.
Artificial intelligence
fromInfoQ
2 months ago

Working with Code Assistants: The Skeleton Architecture

Combining Vertical Slice architecture with Dependency Inversion and a Skeleton of base classes constrains AI code assistants' context, producing safer, consistent, and maintainable generated code.
fromMedium
1 month ago

AI-Generated Code Has a Shelf Life

We build production platforms with AI every day, and we work with teams doing the same with their own stack -Cursor, Claude Code, Copilot. The difference shows up fast. By day two, some codebases are already harder to change than they were yesterday. Others keep getting easier. The difference is never the model. It's what the code lands in. The teams we work with that hit a wall? It's always the same story.
Software development
fromComputerworld
1 month ago

Testing can't keep up with rapidly advancing AI systems: AI Safety Report

AI systems continued to advance rapidly over the past year, but the methods used to test and manage their risks did not keep pace, according to the International AI Safety Report 2026. The report, produced with inputs from more than 100 experts across over 30 countries, said that pre-deployment testing was increasingly failing to reflect how AI systems behaved once deployed in real-world environments, creating challenges for organisations that had expanded their use of AI across software development, cybersecurity, research, and business operations.
Artificial intelligence
fromEngadget
2 months ago

Ring can now verify if a video has been altered

Ring has launched a new tool that can tell you if a video clip captured by its camera has been altered or not. The company says that every video downloaded from Ring starting in December 2025 going forward will come with a digital security seal. "Think of it like the tamper-evident seal on a medicine bottle," it explained. Its new tool, called Ring Verify, can tell you if a video has been altered in any way.
Gadgets
Gadgets
fromTheregister
2 months ago

Logitech mouse mayhem traced to expired dev certificate

An expired developer certificate caused Logitech's macOS G HUB and Logi Options+ apps to fail, breaking device settings; manual patches are required to restore functionality.
#secure-boot
fromZDNET
1 month ago
Information security

Your PC's critical security certificates may be about to expire - how to check

fromEngadget
1 month ago
Information security

Microsoft will start refreshing Secure Boot certificates in March for Windows 11 and Windows 10 ESU users

fromZDNET
1 month ago
Information security

Your PC's critical security certificates may be about to expire - how to check

fromEngadget
1 month ago
Information security

Microsoft will start refreshing Secure Boot certificates in March for Windows 11 and Windows 10 ESU users

Software development
fromTheregister
1 month ago

Test-driven development ideal for AI, says Agile workshop

Test-driven development is essential for AI-driven coding because it prevents agents from producing tests that validate incorrect implementations.
fromdzone.com
2 months ago

Managing Changing Hardware/Peripherals in a Robust POS

Retail point-of-sale systems today offer a wide range of options for peripherals and hardware. Their technical specifications play a major role in selection, and big retailers often choose multiple vendors to reduce a single point of failure. This gives them an advantage to negotiate price or support as well. Technically, these peripherals also require updating with new models and may have new feature sets. This necessitates the redevelopment of point-of-sale applications, increasing development costs.
Information security
fromSecurityWeek
1 month ago

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, Phoenix Contact

Siemens has published eight new advisories. The company has released patches and mitigations for high-severity issues in Desigo CC, Sentron Powermanager, Simcenter Femap and Nastran, NX, Sinec NMS, Solid Edge, and Polarion products. A medium-severity flaw has been found in Siveillance Video Management Servers. Exploitation of the vulnerabilities can lead to unauthorized access, XSS, DoS, code execution, and privilege escalation.
Information security
Software development
fromDevOps.com
1 month ago

Test Automation Strategy for Growing Software Teams - DevOps.com

A structured, focused test automation strategy enables growing software teams to scale quality, maintain release velocity, and reduce defect leakage while minimizing maintenance overhead.
Information security
fromSecurityWeek
2 months ago

Organizations Warned of Exploited Linux Vulnerabilities

Critical GNU Inetutils telnetd authentication bypass (CVE-2026-24061) enables remote root via crafted Telnet USER variable, and kernel integer overflow (CVE-2018-14634) permits privilege escalation.
fromInfoQ
2 months ago

What Testers Can Do to Ensure Software Security

A secure software development life cycle means baking security into plan, design, build, test, and maintenance, rather than sprinkling it on at the end, Sara Martinez said in her talk Ensuring Software Security at Online TestConf. Testers aren't bug finders but early defenders, building security and quality in from the first sprint. Culture first, automation second, continuous testing and monitoring all the way; that's how you make security a habit instead of a fire drill, she argued.
Software development
Information security
fromThe Hacker News
2 months ago

Unpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover

A firmware-upload error in TOTOLINK EX200 can trigger an unauthenticated root-level telnet service, enabling authenticated web-interface users to gain full device control.
Information security
fromThe Hacker News
1 month ago

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

Vendors released critical security patches across Microsoft, Adobe, SAP, and Intel TDX, addressing actively exploited zero-days, code-injection, authorization flaws, and multiple other vulnerabilities.
fromMedium
1 month ago

Test smart: how to solve dilemmas as QA?

To find the typical example, just observe an average stand-up meeting. The ones who talk more get all the attention. In her article, software engineer Priyanka Jain tells the story of two colleagues assigned the same task. One posted updates, asked questions, and collaborated loudly. The other stayed silent and shipped clean code. Both delivered. Yet only one was praised as a "great team player."
Software development
Information security
fromZero Day Initiative
2 months ago

Zero Day Initiative - The Alpitronic HYC50 Hardware Teardown for Pwn2Own Automotive 2026

Alpitronic HYC50 is a well-documented, mature EV charger with exploitable physical debug and manufacturing interfaces and custom development units requiring hardware inspection before power-up.
Software development
fromMedium
1 year ago

How Bit Reduces Development Costs

A composable, well-documented codebase increases reuse, reduces bugs, and enables AI and non-technical stakeholders to contribute effectively.
Information security
fromZDNET
2 months ago

Microsoft said my Windows 10 PC no longer supported updates - but this software saved it

Third-party micropatch service 0patch can provide targeted security fixes to keep Windows 10 systems protected after Microsoft ends official support and ESU.
Software development
fromInfoWorld
1 month ago

Visual Studio adds GitHub Copilot unit testing for C#

GitHub Copilot testing automatically generates, runs, and iteratively repairs unit tests, provides structured summaries and coverage insights, and supports free-form .NET prompting (paid license required).
Information security
fromThe Hacker News
2 months ago

New Advanced Linux VoidLink Malware Targets Cloud and container Environments

VoidLink is a modular, cloud-native Linux malware framework enabling long-term stealthy access to cloud and container environments, targeting developer tools and cloud credentials.
fromBleepingComputer
1 month ago

Critical n8n flaws disclosed along with public exploits

Multiple critical vulnerabilities in the popular n8n open-source workflow automation platform allow escaping the confines of the environment and taking complete control of the host server. Collectively tracked as CVE-2026-25049, the issues can be exploited by any authenticated user who can create or edit workflows on the platform to perform unrestricted remote code execution on the n8n server. Researchers at several cybersecurity companies reported the problems, which stem from n8n's sanitization mechanism and bypass the patch for CVE-2025-68613, another critical flaw addressed on December 20.
Information security
fromTheregister
2 months ago

Tech support detective solved crime by checking the carpark

"A floor manager responsible for production asked me to fix his PC, which was so slow he could literally make a coffee in the time between double-clicking an icon and having the program open," Parker told On Call. The manager's PC was only a year old and ran Windows XP, a combo that at the time of this tale should have made for decent performance.
Information security
Information security
fromTheregister
2 months ago

Techie's one ring brought darkness by shorting a server

A technician wearing a wedding ring shorted a server board, causing an outage, briefly concealed the failure, and service resumed after an unexpected reboot.
Information security
fromDEV Community
1 month ago

I Let Claude Write 60 Functions. 65-75% Had Security Vulnerabilities.

AI code generation models produce insecure code by default, with no statistically significant difference among the tested models.
Information security
fromDroids On Roids
2 months ago

When ZeroWidth Isn't Zero: How I Found and Fixed a Vulnerability | Blog

Unicode Variation Selectors can inflate UTF-16 storage size while still passing perceived-length checks, enabling payload injection, performance issues, and possible database crashes.
Information security
fromDevOps.com
1 month ago

Survey Surfaces More Focus on Software Security Testing and API Security - DevOps.com

Many enterprises plan to increase spending on software security testing, API security, and application security as AI-driven code growth strains DevSecOps capacity.
[ Load more ]