Threat Intelligence
All Threat Intelligence Resources
|
Blog
Oct 30, 2025
Evolving Product Security: Scaling YARA Detections with the Binarly Transparency Platform v3.5
The latest release of the Binarly Transparency Platform (version 3.5) introduces several new features designed to help organizations strengthen and secure software supply chains. One key enhancement is the integration and full support of YARA, the de facto standard widely used for malware detection, threat hunting, and digital forensics.
Threat Intelligence
News
Sep 11, 2025
Binarly to Deliver Fourth Consecutive Keynote at LABScon, Unveil New Research on Firmware Trust Failures
Binarly, the industry leader in software and firmware supply‑chain security, will take the keynote day stage at LABScon for the fourth year in a row, reinforcing the company's role as a go-to source for groundbreaking technical research at one of the cybersecurity industry's premier conferences. This year's presentation, Signed and Dangerous: BYOVD Attacks on Secure Boot, presents the first large-scale census of signed UEFI modules, drawn from both public threat intelligence feeds and Binarly's private telemetry.
Vulnerability REsearchThreat Intelligence
Blog
Sep 10, 2025
Signed and Dangerous: BYOVD Attacks on Secure Boot
The Binarly REsearch team conducted an analysis of signed UEFI modules and the findings show the true scale of the attack surface hidden inside Secure Boot's trust model. Across thousands of firmware images, we found that modern platforms typically trust approximately 1,500 signed modules, with some builds peaking above 4,000.
Threat Intelligence
Blog
Aug 12, 2025
Persistent Risk: XZ Utils Backdoor Still Lurking in Docker Images
In this blog, we share a new finding in the XZ Utils saga: several Docker images built around the time of the compromise contain the backdoor. At first glance, this might not seem alarming: if the distribution packages were backdoored, then any Docker images based on them would be infected as well. However, what we discovered is that some of these compromised images are still publicly available on Docker Hub.
XZ BackdoorThreat Intelligence
Blog
Apr 23, 2025
The Hidden Danger of Probabilistic Scoring: Introducing Exploitation Maturity Score (EMS)
Introducing Exploitation Maturity Score (EMS), designed to measure the present by using real-world signals like public PoCs, exploit reliability, ransomware activity, public and private threat intelligence telemetry.
Threat Intelligence
Blog
Apr 23, 2025
Binarly Transparency Platform v3.0: Actionable Threat Intelligence Meets Exploitation-Aware Prioritization
The latest release of the Binarly Transparency Platform introduces powerful new capabilities that bring clarity to the chaos of vulnerability management and software supply chain security. This update is purpose-built to help enterprise defenders to prioritize what truly matters and to surface the vulnerabilities that pose real, immediate security risk.
Threat Intelligence
Blog
Mar 20, 2025
Clevo Boot Guard Keys Leaked in Update Package
Over the past few years, the Binarly Research team has led the way in documenting security problems haunting the entire UEFI ecosystem. We presented our discoveries at major security conferences like OffensiveCon, Black Hat, LABScon and RE//verse to share data and collaborate with the industry to secure the UEFI ecosystem.
Threat Intelligence
Blog
Feb 13, 2025
Binarly Tracking Updates for CVE-2024-56161 – A 'High Risk' Microcode Flaw in AMD CPU's
Microcode has always been a crucial component in platform security for the x86 ecosystem. Any vulnerability in microcode leads to significant issues and long-standing side effects across the entire industry. Last week, we witnessed a rare instance of such a vulnerability highlighting potential gaps in AMD's product security practices, prompting industry-wide discussion on the security implications for confidential computing.
Vulnerability REsearchThreat Intelligence
Blog
Jan 21, 2025
From Trust to Trouble: The Supply Chain Implications of a Broken DBX
Binarly REsearch provides a retrospective view on how updates to dbx were handled, both for this new CVE and in the past.
Threat Intelligence
Blog
Sep 19, 2024
Repeatable Failures: Test Keys Used to Sign Production Software…Again?
After discovering PKFail, the Binarly REsearch team went on the hunt for other instances of non-production test keys being used in firmware binaries. In this case, non-production test keys were originally generated by reference implementation vendors sitting at the top of the supply chain and then propagated to downstream vendors which often failed to replace them.
Vulnerability REsearchThreat Intelligence
Blog
Feb 8, 2024
The Dark Side of UEFI: A Technical Deep-Dive into Cross-Silicon Exploitation
Uncover the UEFI's dark side with a groundbreaking study on Cross-Silicon Exploitation. Explore ARM's impact on UEFI security in this technical dive.
Vulnerability REsearchThreat Intelligence
Blog
Nov 8, 2023
Dissecting Intel's Explanation of Key Usage in Integrated Firmware Images (IFWI)
Uncover insights into key misuse in integrated firmware images with BINARLY's analysis of Intel's explanation. Discover the impact on the software supply chain.
Threat IntelligenceVulnerability REsearch
Press
Oct 11, 2023
Source Code for BlackLotus Windows UEFI Malware Leaked on GitHub
BleepingComputer reports on BlackLotus bootkit source code leak.
Threat Intelligence
Press
Sep 27, 2023
China APT Cracks Cisco Firmware in Attacks Against the US and Japan
Dark Reading covers BlackTech APT firmware attacks on Cisco devices.
Threat Intelligence
Blog
Sep 27, 2023
A Silent Threat in Our Devices: The BlackTech Firmware Attacks
Protect Your Devices: Uncover the Stealthy BlackTech Firmware Threat - Latest findings from NSA, FBI, CISA & NISC. Stay informed & secure.
Threat Intelligence
Blog
Aug 24, 2023
A Fractured Ecosystem: Lingering Vulnerabilities in Reference Code is a Forever Problem
Uncover the challenges of lingering vulnerabilities in reference code within a fractured ecosystem. Learn how these issues impact supply chains.
Vulnerability REsearchThreat Intelligence
Blog
Jul 20, 2023
Leaked MSI Source Code with Intel OEM Keys: How Does This Affect Industry-wide Software Supply Chain?
Uncover the impact of leaked MSI source code and Intel OEM keys on the software supply chain. Deep dive by BINARLY security experts. Implications revealed!
Threat Intelligence
Blog
Mar 3, 2023
The Untold Story of the BlackLotus UEFI Bootkit
Uncover the secrets of the Black Lotus UEFI Bootkit. Explore the history and challenges of detecting and analyzing rootkits and bootkits. Dive into the world of advanced threat analysis.
Threat Intelligence
Blog
Nov 17, 2022
OpenSSL Usage in UEFI Firmware Exposes Weakness in SBOMs
Uncover vulnerabilities in UEFI firmware with insights on OpenSSL updates & SBOMs. Discover the impact on supply chain security. Stay informed.
Vulnerability REsearchThreat Intelligence
Blog
Nov 9, 2022
Leaked Intel Boot Guard Keys: What Happened? How Does it Affect the Software Supply Chain?
Understand the repercussions of leaked Intel Boot Guard keys. Discover how it can impact the software supply chain. Stay informed with our insightful analysis.
Threat Intelligence
Blog
Oct 5, 2022
New Attacks to Disable and Bypass Windows Management Instrumentation [LABSCon Edition]
Discover new attacks to bypass and disable Windows Management Instrumentation in the LABSCon Edition. Learn about the 'one-bit change attack' and its impact on endpoint security solutions.
Threat Intelligence
Blog
Aug 16, 2022
Black Hat 2022: The Intel PPAM attack story
Discover the dark world of firmware vulnerabilities and persistent cyber threats with Black Hat 2022. Unveiling the Intel PPAM attack story and more!
Vulnerability REsearchThreat Intelligence
Blog
Mar 21, 2022
Repeatable Failures: AMI UsbRt - Six Years Later, Firmware Attack Vector Still Affect Millions of Enterprise Devices
Discover how BINARLY's Research Team is boosting enterprise device security with coordinated disclosures. Stay informed on patching Dell BIOS vulnerabilities.
Vulnerability REsearchThreat Intelligence
Blog
Jan 21, 2022
A deeper UEFI dive into MoonBounce
Unlock the depths of UEFI with Kaspersky Lab's new discovery, MoonBounce. Explore this intriguing UEFI firmware threat and the world of APT malware.
Threat Intelligence
Blog
Dec 27, 2021
Firmware Supply-Chain Security is Broken: Can we Fix it?
Uncover how the firmware supply chain security is at risk and explore solutions with BINARLY CEO's insights. Dive into the evolving threats.
Threat Intelligence
Blog
Nov 15, 2021
Design issues of modern EDRs: bypassing ETW-based solutions
Enhance firmware security with insights on modern EDR design flaws bypassing ETW-based solutions. Learn more from BINARLY experts at Black Hat Europe 2021.
Threat Intelligence
Blog
Jul 12, 2021
Who Watches BIOS Watchers?
Discover how BIOS Watchers safeguard against vulnerabilities in Intel Boot Guard implementation. Unveil key insights from recent research at Black Hat Vegas.
Vulnerability REsearchThreat Intelligence
Ship and buy software you can prove is safe.
Schedule a live demo to see how Binarly validates SBOM/CBOM, surfaces risks, and charts a measurable path to post-quantum readiness