IN THE NEWS TODAY
“Rewrite it in Rust”: A Brute Force Approach to Memory Safety
In Exploring Memory Safety in Critical Open Source Projects, CISA, the FBI, and other foreign cyber security agencies report that approximately 52% of critical [...]
CrowdStrike: A Lesson in Memory Safety
This blog post discusses the recent CrowdStrike incident where a flawed update caused blue screen errors (BSODs) on Windows systems, leading to widespread disruptions. [...]
How can a Stack Buffer Overflow be used to Execute Arbitrary Code?
The article explains Stack-based Buffer Overflow attacks (CWE-121), highlighting their mechanisms, severe consequences, and the lack of protections in embedded devices. It illustrates exploitation [...]
PRESS RELEASE: NIST Awards ObjectSecurity OT Cybersecurity Grant
San Diego, Calif. – June 24, 2024 – ObjectSecurity, a leader in solving complex, evolving defense and industrial cybersecurity and supply chain risk challenges, today [...]
A Deep Dive into the Recent Eclipse ThreadX CVEs: Who’s Affected?
This blog post discusses two newly discovered CVEs affecting Eclipse ThreadX before version 6.4.0: CVE-2024-2214 and CVE-2024-2212. Discovered by Humanativa Group, these vulnerabilities involve [...]
PRESS RELEASE: DARPA Awards ObjectSecurity $1.5M Embedded Device Analysis Contract
San Diego, Calif. – May 24, 2024 – ObjectSecurity, a leader in solving complex, evolving defense and industrial cybersecurity and supply chain risk challenges, today [...]
Finding Segmentation Faults in Binary Machine Code: Comparing Different Approaches
The blog post explores different approaches to finding segmentation faults in binary machine code. It compares static analysis, fuzzing, and concolic analysis. While static [...]
You Should be Automating Binary Reverse Engineering: Here’s Why.
Binary reverse engineering is a luxury not many can afford. Up until now, there haven't been options to automate and scale the skills and [...]
Detecting the xz-utils Backdoor with Automation
In this ObjectSecurity blog post, we discuss how automated binary vulnerability analysis helps detect advanced attacks such as the recently discovered "xz-utils backdoor", which [...]
Automating Binary Exploit Detection using the ObjectSecurity OT.AI Platform
Binary analysis is essential for protecting software, running on various devices, when you do not have access to resources such as source code, open [...]