Latest news with #AlexMatrosov


Business Wire
04-08-2025
- Business
- Business Wire
Binarly Partners with QuSecure to Accelerate Enterprise Post‑Quantum Readiness
SANTA MONICA, Calif.--(BUSINESS WIRE)--Binarly, the industry leader in software and firmware supply‑chain security, is announcing a strategic technology alliance with QuSecure, a provider of post‑quantum cryptography (PQC) and crypto‑agility solutions, to deliver the most comprehensive solution available for enterprises facing quantum-safe compliance deadlines. The Binarly/QuSecure solution captures the presence of weak, vulnerable, or potentially compromised cryptographic assets. Share The integration combines Binarly's deep‑binary cryptographic analysis with QuSecure's QuProtect platform, giving defenders a single pane of glass for discovering, inventorying and remediating cryptographic risk across every layer of the software stack. By automating the creation and validation of Cryptographic Bills of Materials (CBOMs) for any binary, the joint solution dramatically shortens PQC‑migration timelines and streamlines compliance reporting. The joint-solution uses software inspection to capture the presence of weak, vulnerable, or potentially compromised cryptographic assets. These include weak private and public keys, expired x509 certificates, PKCS7 bundles, leaked or compromised keys, cryptographic protocols and cryptographic algorithms. The technology alliance provides: Comprehensive PQC asset discovery: QuSecure's lightweight agent uploads binaries to the QuProtect platform, where Binarly's research-powered engine pinpoints every certificate, key, algorithm and protocol in use, even in opaque third‑party components. CBOM/Software Bill of Materials (SBOM) generation: Automatically builds verifiable inventories that map ownership, validity periods, algorithm strength and reachability of each cryptographic element. Cryptographic reachability: Shows which algorithms are executed at runtime so teams can prioritize what must be replaced before NIST, sector‑specific and government-ordered deadlines hit. PQC compliance dashboards: Flags outdated or quantum‑vulnerable crypto, tracks NIST‑approved PQC algorithms and provides prescriptive guidance for upgrading. 'We set out with a mission to give organizations the X‑ray vision they need to navigate the post‑quantum era,' said Alex Matrosov, CEO and Head of Research at Binarly. 'As the premier software CBOM platform trusted by the Fortune 500, pairing Binarly's deep code‑level insights with QuSecure's unmatched network‑level excellence translates directly into faster, lower‑risk PQC migrations and bullet‑proof compliance.' 'By joining forces with Binarly, we're helping to accelerate a new required bar for cryptographic discovery, visibility and control,' said Rebecca Krauthamer, Co-Founder and CEO of QuSecure. 'Many organizations need help meeting emerging government and industry requirements for SBOMs, with CBOM cryptographic component audit requirements. With our partnership, enterprises can get that much closer to a continuous lifecycle of identifying weaknesses, remediating them, automating reporting, and transitioning confidently to quantum-resilient security at both the binary and network level.' About Binarly Binarly is a U.S.‑based software and firmware supply‑chain security company founded in 2021. The Binarly Transparency Platform helps device manufacturers, OEMs and enterprise security teams detect vulnerabilities, misconfigurations, secrets and malicious code in firmware and software components—while accelerating the shift to post‑quantum cryptography. Visit for more information. About QuSecure QuSecure is a leader in quantum-safe cybersecurity with a mission to use the advent of quantum computing to act as a catalyst to fix the foundation of data security infrastructure. The QuProtect platform can be purchased through the AWS Marketplace or direct outreach to QuSecure, Accenture, Dell, Cisco, or Carahsoft. QuSecure's quantum-resilient and crypto-agile solutions provide the lowest friction transition path to inventory your cryptographic communications and transition to quantum-resiliency anytime, anywhere, on any device, and across any organization. For more information, see


Tom's Guide
10-06-2025
- Tom's Guide
Major Windows Secure Boot flaw can be used by hackers to install bootkit malware — update your PC right now
Sometimes the features designed to keep our computers safe can put us most at risk thanks to a worrying security flaw that can be exploited by hackers in their attacks. As reported by BleepingComputer, a new Secure Boot bypass (tracked as CVE-2025-3052) was recently discovered that can be used to disable Windows 11's built-in security measures to install bootkit malware. Unlike your typical Windows malware, bootkit malware targets your computer's boot process which allows an attacker to gain full control over your operating system before it even loads. To make matters worse, this type of malware is also persistent and can remain on your PC even after you reinstall Windows. Here's everything you need to know about this new Secure Boot flaw and why it's imperative that you update your Windows PC right now to stay safe from any attacks exploiting it. According to a new blog post, this flaw was discovered by Binarly security researcher Alex Matrosov after he found a BIOS-flashing utility online. Signed with Microsoft's UEFI signing certificate, the utility in question was originally designed for rugged tablets. However, it can run on any of the best Windows laptops or desktops with Secure Boot enabled. First introduced back in 2012 with the release of Windows 8, Secure Boot was created to protect against bootkit malware by ensuring that only trusted software could load during a PC's startup sequence. Ironically, thanks to this flaw, Secure Boot-enabled PCs are now vulnerable to the very thing this security feature was designed to protect against. Following an investigation, it was discovered that the vulnerable module in the utility found by Mastrosov had been available online since at least the end of 2022, though it wasn't until last year that it was uploaded to the malware detection service VirusTotal. Get instant access to breaking news, the hottest reviews, great deals and helpful tips. To show how serious this flaw was, he and the team at Binarly created a proof of concept (PoC) exploit that set the LoadImage function used to enforce Secure Boot to zero which effectively disabled it. With this feature disabled, an attacker can install bootkit malware that can hide from both Windows and any security software installed on a system. Back in February of this year, Mastrosov disclosed the flaw to Microsoft and a fix for it was created. However, while it worked to address the flaw, the software giant determined that it impacted 13 other modules which then had to be fixed as well. So how do you protect yourself from malware that starts before Windows even loads and can easily bypass the best antivirus software? Well, by updating your PC with the latest security updates from Microsoft. In June's Patch Tuesday updates, Microsoft has included a fix for this major security flaw along with patches for other recently discovered vulnerabilities. However, the company has also added 14 new hashes to its Secure Boot dbx revocation list. Fortunately for you, this updated dbx file is contained within Microsoft's latest round of Patch Tuesday updates. While installing the latest Windows updates may seem tedious at times, I highly recommend that you stop and take the time to do so as Microsoft often includes fixes for a variety of different security flaws while also adding new features to its operating system. Given that Patch Tuesday takes place on the second Tuesday of every month, at least you know ahead of time when these very important updates will arrive. This way, you can set aside the time needed to install them or better yet, set your PC to install them automatically. When dealing with security flaws that can bypass your antivirus software, the best identity theft protection services can help you recover your identity as well as any funds lost to malware or other scams as a result of them. Keep in mind though that for identity theft insurance to pay out, you need to be signed up for one of these services before an attack takes place. Although this Secure Boot bypass is worrying, it's worth noting that it wasn't exploited by hackers in the wild. Instead, security researchers created an exploit for it in order to show how dangerous this flaw could be if knowledge of it ended up in the wrong hands. Either way, it's a great reminder as to why it's so important to keep your PC (and all of the computers in your household for that matter) up to date.


Business Wire
23-04-2025
- Business
- Business Wire
Binarly Transparency Platform 3.0 Adds Real‑Time Threat‑Intelligence Prioritization and Exploitation Maturity Scoring
BUSINESS WIRE)--Binarly, a leading firmware and software supply chain security company, today announced the rollout of its flagship Binarly Transparency Platform 3.0, a major update that fuses live threat‑intelligence signals with an exploitation‑aware scoring system to help enterprise teams prioritize the mitigation of vulnerabilities with the most immediate risk. 'Security teams are tired of probabilistic risk scores that read like weather forecasts,' said Alex Matrosov, CEO at Binarly 'EMS puts hard evidence on the table with live data on exploit code, ransomware payloads and breach telemetry.' The release introduces Threat Intelligence Monitoring, a service that tracks public proof‑of‑concept code, ransomware activity, and private telemetry to flag actively exploited flaws the moment they surface. These signals feed a new Exploitation Maturity Score (EMS) that replaces probabilistic models with evidence‑based weighting, giving defenders a clear, continuously updated view of true risk. The company's research team built EMS to measure the present rather than guess the future; historical shifts in the score are charted inside the dashboard so security owners can watch risks rise or recede as exploits mature, proof‑of‑concept code stabilizes, or a vulnerability lands in CISA's KEV (Known Exploited Vulnerabilities) catalog. Because the monitoring stack is developed and curated in‑house, intelligence updates flow to customer consoles without delay. 'Security teams are tired of probabilistic risk scores that read like weather forecasts,' said Alex Matrosov, Binarly's CEO and Head of Research. 'EMS puts hard evidence on the table with live data on exploit code, ransomware payloads, and breach telemetry so our customers can see, in real time, which vulnerabilities are being weaponized.' The Binarly Transparency Platform refresh also debuts Auto‑Advisories and VEX generation to streamline coordinated disclosure when a customer uses the platform to discover new issues in third‑party code, as well as the first wave of Global Search, a cross‑inventory query engine that pulls answers from every product, component, and artifact in seconds. The feature list also includes new export options to simplify hand‑offs to engineering and audit teams, while purpose‑built Post‑Quantum Compliance and Secure‑by‑Design reports translate deep binary analysis into board‑level action plans. 'Our goal with every release is to take noise off the dashboard and put the right signals around what matters,' Matrosov added. 'By linking binary‑level analysis with real‑time intel and clear remediation paths, the platform lets enterprise security teams spend less time sorting data and more time fixing what keeps them up at night,' Matrosov added. Under the hood, Binarly has upgraded its code‑analysis engine with smarter handling of stubs and fix‑ups, clearer evidence paths for unknown vulnerabilities, and an expanded library of Deep Vulnerability Analysis (DVA) checkers focused on UEFI input‑validation flaws. The update also adds detection logic for abnormal PE parsing in firmware modules, a microcode‑specific vulnerability checker, compiler‑and‑build metadata extraction for stronger SBOM validation, cryptographic artifact discovery, and a secret‑detection workflow that now auto‑validates potential credentials to cut false positives. The latest release builds on existing technologies providing reachability analysis, post‑quantum migration tooling, and RBAC collaboration features, extending the platform's reach from visibility to prioritization defined by what is happening in the wild. About Binarly Binarly is a U.S.-based firmware and software supply chain security company founded in 2021. The flagship Binarly Transparency Platform helps device manufacturers, OEMs and enterprise product security teams to detect vulnerabilities, misconfigurations, secrets, and malicious code in devices and software supply chains. Leveraging decades of research and program analysis expertise, we secure businesses, critical infrastructure, and consumers, while also assisting organizations in transitioning to a post-quantum cryptography (PQC) environment. For more information, visit
Yahoo
07-02-2025
- Business
- Yahoo
Binarly Expands Platform to Enable Post-Quantum Compliance Readiness
The all-new Binarly Transparency Platform v2.7 adds cryptographic reachability and PQC compliance features to enable forward-looking organizations to meet NIST standards and deadlines with confidence. SANTA MONICA, Calif., January 30, 2025--(BUSINESS WIRE)--Binarly, a leader in firmware and software supply chain security, today announced the release of its flagship Binarly Transparency Platform v2.7, a major update that immediately enables corporate defenders to prepare for a mandatory transition to Post-Quantum Cryptography (PQC) standards. As quantum computing advances, the National Institute of Standards and Technology (NIST) has issued fresh guidance on Post-Quantum Cryptography (PQC), underscoring the urgency of PQC readiness amid deadlines and regulations. Transitioning large enterprises to meet these new requirements is a lengthy, often complex process. The latest product update has been fitted with patented technologies to handle discovery, inventorying and assessment of cryptographic assets: Cryptographic Keys: Ownership, algorithm identifier, format, and status (active or deprecated) accurately documented. Certificates: Validity period, ownership, and algorithm used, captured and displayed in streamlined reports. Algorithms: Accurate tracking and identification of algorithms in use, and assessment of their ability to resist quantum attacks. Protocols (TLS, etc.): Inventory that includes version and implementation details to track any dependencies. "Preparedness for PQC can't happen overnight," said Ryan Weekes, Chief Product Officer at Binarly. "Our platform helps you discover which assets need immediate attention while delivering the insights required to align with new regulations for post-quantum readiness." By identifying outdated or insecure cryptography, enterprises can better manage their transition to post-quantum standards and avoid compliance gaps. Key PQC-focused enhancements: Cryptographic Reachability: Identify which cryptographic algorithms in a binary are actively used, so you can prioritize changes that truly matter. PQC Compliance: Track NIST-approved post-quantum algorithms, pinpoint outdated cryptography, and plan targeted updates for quantum-safe security. Enhanced CBOM and Reporting: Build a robust inventory of certificates, keys, and algorithms while generating streamlined reports for cross-team collaboration. "Our new cryptographic reachability feature cuts through false positives to highlight exactly which algorithms are actively in use," said Alex Matrosov, CEO and Head of Research at Binarly. "Enterprises gain an actionable blueprint to modernize their cryptographic assets and stay ahead of regulatory mandates." With v2.7, the Binarly Transparency Platform introduces key feature improvements, performance upgrades, and critical updates to better support software supply chain transparency, vulnerability remediation, and regulatory compliance. About Binarly: Binarly is a U.S.-based firmware and software supply chain security company founded in 2021. The company's flagship Binarly Transparency Platform helps device manufacturers, OEMs and enterprise product security teams to detect vulnerabilities, misconfigurations, exposed secrets, and malicious code in hardware and software supply chains. Based in Santa Monica, Calif., Binarly applies decades of research and program analysis expertise to securing businesses, critical infrastructure, and consumers. The technology is also powering enterprise migrations to the NIST-mandated post-quantum cryptography (PQC) standards. View source version on Contacts Media Contact:Tyler Kingtyler@ 818-351-9637