
BINARLY๐ฌ
@binarly_io
Followers
4K
Following
1K
Media
241
Statuses
2K
โ๏ธBinarly is the worldโs most advanced automated software supply chain security platform.
Santa Monica, CA
Joined May 2019
RT @ryanaraine: ๐ Very cool research featuring @binarly_io tech for vuln discovery and prioritization.
security-bits.de
One of the most fun things of doing OT Security is being able to share strange things, just like todays Atlas Copco IPM IAM Process Control. What sounds fancy, well, lets just have a look.
0
4
0
RT @matrosov: ๐ฆ๐ผ๐ณ๐๐๐ฎ๐ฟ๐ฒ ๐๐ฟ๐ฎ๐ป๐๐ฝ๐ฎ๐ฟ๐ฒ๐ป๐ฐ๐, ๐๐ป๐ฑ๐ฒ๐ฟ๐๐๐ฎ๐ป๐ฑ๐ถ๐ป๐ด, ๐ฎ๐ป๐ฑ ๐ถ๐ป๐๐ฝ๐ฒ๐ฐ๐๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐ฎ๐ฟ๐ฒ๐ปโ๐ ๐ท๐๐๐ ๐๐ฒ๐ฐ๐ต๐ป๐ถ๐ฐ๐ฎ๐น ๐ฐ๐ต๐ฎ๐น๐น๐ฒ๐ป๐ด๐ฒ๐, ๐๐ต๐ฒ๐โ๐ฟ๐ฒ ๐ป๐ฎ๐๐ถ๐ผ๐ป๐ฎ๐น ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฝ๐ฟ๐ถ๐ผ๐ฟ๐ถ๐๐ถโฆ.
0
5
0
RT @labscon_io: ๐จ LABScon 2025, the speaker lineup!
labscon.io
Join us September 17-20th for LABScon, an intimate, invite-only event for the top cybersecurity minds to gather, share cutting-edge research.
0
11
0
RT @binarly_io: ๐efiXplorer just hit 1,000โญ๏ธ on GitHub!. Huge thanks to everyone whoโs used, supported, and shared feedback, you made thisโฆ.
github.com
IDA plugin and loader for UEFI firmware analysis and reverse engineering automation - binarly-io/efiXplorer
0
4
0
โจBig news: Binarly is leveling up!. @ChrisEng and Rick Congdon joins our Strategic Advisory Board ๐. Both bring decades of experience shaping AppSec, GTM, and enterprise security. The future of software supply chain security starts at Binarly! ๐.
binarly.io
Binarly announced the appointment of Rick Congdon, Vice President of Americas Sales at Cloudflare, as Independent Board Member and Strategic Advisor, alongside AppSec software security veteran Chris...
0
5
14
RT @phrack: At long last - Phrack 72 has been released online for your reading pleasure! . Check it out: https://t.โฆ.
0
327
0
RT @binarly_io: ๐จMore than a year after the XZ Utils crisis, we found 35+ publicly available Docker Hub images still carrying the backdoor,โฆ.
0
13
0
RT @binarly_io: ๐จAnother day, another round of vulnerability disclosures, this time with 6 new high-impact CVEs identified in Lenovo and Inโฆ.
0
6
0
Thoughts on scaling detections when the majority of your code is coming from third-party vendors โ๏ธ.@matrosov
0
2
7
RT @ryanaraine: ๐ฅ Researchers at Binarly find the XZ Utils backdoor in publicly available Docker Images @binarly_io
binarly.io
In this blog, we share a new finding in the XZ Utils saga: several Docker images built around the time of the compromise contain the backdoor. At first glance, this might not seem alarming: if the...
0
54
0
๐efiXplorer just hit 1,000โญ๏ธ on GitHub!. Huge thanks to everyone whoโs used, supported, and shared feedback, you made this possible!.
github.com
IDA plugin and loader for UEFI firmware analysis and reverse engineering automation - binarly-io/efiXplorer
0
4
10
RT @binarly_io: ๐ฏ๐๐ฒ๐๐ฒ๐ฐ๐ ๐๐ฟ๐ฐ๐ต ๐๐ถ๐ป๐๐
๐๐ต๐ฎ๐ผ๐ ๐ฅ๐๐ง ๐๐ถ๐๐ต ๐๐ถ๐ป๐ฎ๐ฟ๐น๐ ๐ฌ๐๐ฅ๐๐ต๐๐ป๐.In the recent Arch Linux AUR supply chain security incident ( https://t.cโฆ.
0
7
0
RT @binarly_io: Binarly is celebrating @phrack 40th anniversary!. 61st floor energy. Legends only ๐
0
13
0
RT @binarly_io: The side story, we found SandboxBootkit.efi on VT during our REsearch project โUEFI Bootkit Hunting: In-Depth Search for Unโฆ.
binarly.io
The Binarly REsearch team introduces a novel methodology for detecting UEFI bootkits by analyzing their unique code behaviors. By starting from an in-depth analysis of known bootkits, we identify...
0
8
0