ObjectSecurity Blog
Check out the ObjectSecurity blog for all of the newest information.
IN THE NEWS TODAY
The Limits of SAST: Predicting the User
In SAST (static application security testing), source code is analyzed without being executed. SAST can be used to detect buffer overflows, injection flaws, and [...]
Fort Meade Tech Expo 2024
Come see our team at the Fort Meade Tech Expo at Club Meade September 17, 2024 0830-1300 6600 Mapes Rd, Fort [...]
“Rewrite it in Rust”: A Brute Force Approach to Memory Safety
In Exploring Memory Safety in Critical Open Source Projects, CISA, the FBI, and other foreign cyber security agencies report that approximately 52% of critical [...]
CrowdStrike: A Lesson in Memory Safety
This blog post discusses the recent CrowdStrike incident where a flawed update caused blue screen errors (BSODs) on Windows systems, leading to widespread disruptions. [...]
How can a Stack Buffer Overflow be used to Execute Arbitrary Code?
The article explains Stack-based Buffer Overflow attacks (CWE-121), highlighting their mechanisms, severe consequences, and the lack of protections in embedded devices. It illustrates exploitation [...]
PRESS RELEASE: NIST Awards ObjectSecurity OT Cybersecurity Grant
San Diego, Calif. – June 24, 2024 – ObjectSecurity, a leader in solving complex, evolving defense and industrial cybersecurity and supply chain risk challenges, today [...]
A Deep Dive into the Recent Eclipse ThreadX CVEs: Who’s Affected?
This blog post discusses two newly discovered CVEs affecting Eclipse ThreadX before version 6.4.0: CVE-2024-2214 and CVE-2024-2212. Discovered by Humanativa Group, these vulnerabilities involve [...]
PRESS RELEASE: DARPA Awards ObjectSecurity $1.5M Embedded Device Analysis Contract
San Diego, Calif. – May 24, 2024 – ObjectSecurity, a leader in solving complex, evolving defense and industrial cybersecurity and supply chain risk challenges, today [...]
Finding Segmentation Faults in Binary Machine Code: Comparing Different Approaches
The blog post explores different approaches to finding segmentation faults in binary machine code. It compares static analysis, fuzzing, and concolic analysis. While static [...]
You Should be Automating Binary Reverse Engineering: Here’s Why.
Binary reverse engineering is a luxury not many can afford. Up until now, there haven't been options to automate and scale the skills and [...]
Detecting the xz-utils Backdoor with Automation
In this ObjectSecurity blog post, we discuss how automated binary vulnerability analysis helps detect advanced attacks such as the recently discovered "xz-utils backdoor", which [...]
Automating Binary Exploit Detection using the ObjectSecurity OT.AI Platform
Binary analysis is essential for protecting software, running on various devices, when you do not have access to resources such as source code, open [...]
PRESS RELEASE: Army awards ObjectSecurity $1M Vehicle Cybersecurity Contract
San Diego, Calif. – March 20, 2024 – ObjectSecurity, a leader in solving complex, evolving defense and industrial cybersecurity and supply chain risk challenges, today [...]
PRESS RELEASE: ObjectSecurity Announces Participation in Department of Commerce Consortium Dedicated to AI Safety
PRESS RELEASE: ObjectSecurity Announces Participation in Department of Commerce Consortium Dedicated to AI Safety ObjectSecurity will be one of more than 200 leading AI [...]
ObjectSecurity OT.AI Platform Slots Perfectly With Newly Announced Navy Cyber Strategy
ObjectSecurity OT.AI Platform emerges as a crucial tool in realizing the Department of the Navy's (DON) Cybersecurity Superiority Vision (CSV). By proactively identifying weaknesses [...]
Don’t Wait Until It’s Too Late: Prepare for the New Executive Order 14110 on AI: Safe, Secure, Trustworthy Use
What is Executive Order 14110? On October 30, 2023, President Biden issued Executive Order 14110 on “Safe, Secure, and Trustworthy Development and Use of Artificial [...]
Employee AI safety/security policy
In today's rapidly evolving technological landscape, the implementation of robust AI safety and security policies is of paramount importance for businesses. These policies function [...]
VirnetX and ObjectSecurity Form Technology Alliance Partnership to Provide Vulnerability Analysis
VirnetX and ObjectSecurity Form a Technology Alliance Partnership to Provide Secure Cyber Vulnerability Analysis in Private Cloud Environments ZEPHYR COVE, Nev., June 13, 2023 /PRNewswire/ -- VirnetX™ [...]