Syndicated Blog

Eclypsium
Supply Chain Security for the Modern Enterprise
APT Just Means Another Path Traversal

APT Just Means Another Path Traversal

| | Blog
New Zero Day in Palo Alto GlobalProtect VPN Appliances Introduction On April 12th, Volexity announced they discovered zero day exploitation occurring against Palo Alto GlobalProtect VPN appliances running PAN-OS 10.2 and above ...

RSA Conference 2024

The post RSA Conference 2024 appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise ...
Zammis Clark: An Evil Maid's Dream - Windows Boot Security was Broken Anyway

Microsoft Issues Patches for 24 New Secure Boot Vulnerabilities

| | Blog
Secure Boot Matters We cannot blindly trust software. The software (and firmware) we know and (sometimes) love today simply cannot be trusted without validation. Several recent examples of supply chain breaches such ...

Automata An Expert Researcher Never Sleeps

Imagine you had 1,000 expert security researchers working continuously to analyze all the new binaries in your environment to find threats, vulnerabilities, and misconfigurations. That would provide some protection against the rising ...
BTS #27 - Governance, Compliance, and The Digital Supply Chain - Josh Marpet

BTS #27 – Governance, Compliance, and The Digital Supply Chain – Josh Marpet

| | Podcasts
Show Notes The post BTS #27 - Governance, Compliance, and The Digital Supply Chain - Josh Marpet appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise ...

Eclypsium’s Digital Supply Chain Security Platform Releases AI-Assisted Binary Analysis Engine

| | Press Release
New Eclypsium Automata replicates expert security researchers’ knowledge and leverages advances in machine learning to discover threats, backdoors, and vulnerabilities across a wide range of infrastructure devices Portland, OR – April 10, ...
Multiplying Security Research: How Eclypsium Automates Binary Analysis at Scale

Multiplying Security Research: How Eclypsium Automates Binary Analysis at Scale

| | Blog
Today, we’re proud to announce our Eclypsium Automata binary analysis system, which replicates the knowledge and tooling used by our expert human security research team. This blog post describes the reasons why ...

Supporting Cross Domain Solutions

| | Solution Briefs
U.S. Federal Agencies exchange sensitive information across boundaries to fulfill their mission objectives. Given the growingreliance on information exchange spanning multiple domains within operational contexts, cross domain solution (CDS)systems have emerged as ...
XZ and the Threats to the Digital Supply Chain

XZ and the Threats to the Digital Supply Chain

| | Blog
The discovery of the backdoor in xz utils compression software last week has shone a spotlight on the threats to the digital supply chain. Wired has an excellent analysis on the attack, ...

Market Forces vs. Regulation: How to Drive IT Product Safety

| | Live Webinars
Over the past 50 years, traveling in automobiles has become much safer. Part of this is due to government regulations and part due to market forces. Given the criticality of enterprise IT ...