Thursday, May 22, 2025
HomeCyber Security NewsMITRE Releases EMB3D Cybersecurity Threat Model for Embedded Devices

MITRE Releases EMB3D Cybersecurity Threat Model for Embedded Devices

Published on

SIEM as a Service

Follow Us on Google News

In collaboration with Red Balloon Security, Narf Industries, and Niyo Little Thunder Pearson, MITRE has unveiled EMB3D, a comprehensive threat model designed to address the growing cybersecurity risks faced by embedded devices in critical infrastructure sectors.

Embedded devices, widely employed across industries such as oil and gas, electric, water management, automotive, medical, satellite, autonomous systems, and unmanned aircraft systems, often lack proper security controls and are insufficiently tested for vulnerabilities.

As sophisticated cyber adversaries increasingly target these devices, EMB3D aims to provide a common understanding of the threats posed and the necessary security mechanisms to mitigate them.

- Advertisement - Google News

Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers

A Collaborative Framework

EMB3D aligns with and expands upon existing models like Common Weakness Enumeration (CWE), MITRE ATT&CK®, and Common Vulnerabilities and Exposures (CVE), but with a specific focus on embedded devices.

The framework offers a cultivated knowledge base of cyber threats to embedded devices, including those observed in field environments, demonstrated through proofs-of-concept, or derived from theoretical research.

Workflow Summary

These threats are mapped to device properties, enabling users to develop and tailor accurate threat models for specific embedded devices.

For each identified threat, EMB3D suggests technical mechanisms that device vendors should implement to protect against it, promoting a secure-by-design approach.

EMB3D is intended to be a living framework, continuously updated with new threats, mitigations, and security defenses as they emerge.

Scheduled for public release in early 2024, EMB3D will be an open community resource, allowing the security community to contribute additions and revisions.

“We encourage device vendors, asset owners, researchers, and academia to review the threat model and share feedback, ensuring our collective efforts remain at the forefront of safeguarding our interconnected world,” said Yosry Barsoum, vice president and director of MITRE’s Center for Securing the Homeland.

EMB3D aims to improve the cyber posture of critical infrastructure sectors by fostering collaboration and leveraging collective expertise, thus building a safer and more secure digital future for those reliant on operational technology.

On-Demand Webinar to Secure the Top 3 SME Attack Vectors: Watch for Free

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Target Mobile Users Using PWA JavaScript to Bypass Browser Security

A sophisticated new injection campaign has been uncovered, targeting mobile users through malicious third-party...

Docker Zombie Malware Infects Containers for Crypto Mining and Self-Replication

A novel malware campaign targeting containerized infrastructures has emerged, exploiting insecurely exposed Docker APIs...

Hackers Masquerade as Organizations to Steal Payroll Logins and Redirect Payments from Employees

ReliaQuest, hackers have deployed a cunning search engine optimization (SEO) poisoning scheme to orchestrate...

PupkinStealer Exploits Web Browser Passwords and App Tokens to Exfiltrate Data Through Telegram

A newly identified .NET-based information-stealing malware, dubbed PupkinStealer (also known as PumpkinStealer in some...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Target Mobile Users Using PWA JavaScript to Bypass Browser Security

A sophisticated new injection campaign has been uncovered, targeting mobile users through malicious third-party...

Docker Zombie Malware Infects Containers for Crypto Mining and Self-Replication

A novel malware campaign targeting containerized infrastructures has emerged, exploiting insecurely exposed Docker APIs...

Hackers Masquerade as Organizations to Steal Payroll Logins and Redirect Payments from Employees

ReliaQuest, hackers have deployed a cunning search engine optimization (SEO) poisoning scheme to orchestrate...