Enhance firmware security with insights on modern EDR design flaws bypassing ETW-based solutions. Learn more from BINARLY experts at Black Hat Europe 2021.| www.binarly.io
In March, we received notifications about the open-source project XZ Utils, which provides lossless data compression on all Unix-like operating systems.| www.binarly.io
The accidental leakage of sensitive information like API keys and passwords, commonly from container images, poses significant risks, requiring thorough scanning to prevent exposure. Challenges in secret detection include managing diverse secret formats, minimizing false positives, and ensuring high performance to avoid CI/CD delays. Binarly Transparency Platform 2.0 addresses these issues with enhanced scanning capabilities, which were benchmarked against popular open-source solutions like g...| www.binarly.io
Binarly’s Transparency Platform offers firmware security for supply chain risk management. Gain visibility into threats and recommendations on remediation.| www.binarly.io
In this blog, we share a new finding in the XZ Utils saga: several Docker images built around the time of the compromise contain the backdoor. At first glance, this might not seem alarming: if the distribution packages were backdoored, then any Docker images based on them would be infected as well. However, what we discovered is that some of these compromised images are still publicly available on Docker Hub.| www.binarly.io
A Lighttpd vulnerability dating back to 2018 is still putting Intel and Lenovo servers at risk. These vulnerable devices should not be exposed to the internet.| www.binarly.io