https://www.praetorian.com/blog/reversing-and-exploiting-embedded-devices-part-1-the-software-stack/
Praetorian
Reversing and Exploiting Embedded Devices: The Software Stack (Part 1) -
The software security of embedded devices is often overlooked. Learn about the common issues allowing bad actors to exploit embedded devices.