The Wretched State of OT Firmware Patching
4 min read
The Wretched State of OT Firmware Patching
By Eric Byres on October 11, 2023

This blog is a follow-up to our first post on the 2023 Microsoft Digital Defense Report where I described our collaboration with Microsoft on identified exploitable OT vulnerabilities.There...

Continue Reading
Microsoft Digital Defense Report: Behind the Scenes Creating OT Vulnerabilities
3 min read
Microsoft Digital Defense Report: Behind the Scenes Creating OT Vulnerabilities
By Eric Byres on October 5, 2023

Earlier this summer, aDolus collaborated with Microsoft on vulnerability analysis and contributed to their Microsoft Digital Defense Report 2023 (MDDR 2023). This report is a significant...

Continue Reading
An Analysis of Generative AI: How to Be Confidently Wrong
7 min read
An Analysis of Generative AI: How to Be Confidently Wrong
By Marcello Delcaro on April 11, 2023

The recent release of the National Cybersecurity Strategy document by the White House prompted me to test Microsoft's new Bing chat feature, which is powered by OpenAI's language model,...

Continue Reading
S4x23 SBOM Challenge — Part 3: VEX Document Ingestion
7 min read
S4x23 SBOM Challenge — Part 3: VEX Document Ingestion
By Derek Kruszewski on March 16, 2023

Three weeks ago I reported on the first part of the S4x23 SBOM Challenge run by Idaho National Laboratory (INL), which focused on SBOM Creation. Last week I reported on the second part:...

Continue Reading
S4x23 SBOM Challenge — Part 2: SBOM Ingestion
7 min read
S4x23 SBOM Challenge — Part 2: SBOM Ingestion
By Derek Kruszewski on March 8, 2023

Two weeks ago I reported on the first part of the SBOM Challenge at the S4x23 cybersecurity conference in Miami, Florida. The Day 1 goal was for each team to create an accurate SBOM for...

Continue Reading
S4x23 SBOM Challenge — Part 1
10 min read
S4x23 SBOM Challenge — Part 1
By Derek Kruszewski on February 24, 2023

The aDolus Team has just returned from participating in the SBOM Challenge at the S4x23 cybersecurity conference in Miami, Florida. This blog is the first of a series reporting on what we...

Continue Reading
A Deeper Dive into VEX Documents
5 min read
A Deeper Dive into VEX Documents
By Derek Kruszewski on April 15, 2022

At the end of last summer, I wrote a blog post explaining the merits of Vulnerability Exploitability eXchange (VEX) documents. Almost 8 months later, I stand by the importance of these...

Continue Reading
Log4j: Panic or Lesson? | How to Protect Deployed Assets
4 min read
Log4j: Panic or Lesson? | How to Protect Deployed Assets
By Ron Brash on December 21, 2021

Cleaning up the Mess will Take a Methodical Approach Nearly every week the cybersecurity community buzzes around a newly discovered vulnerability or a breach. December’s alert for the ...

Continue Reading
Sorry Blackberry: You Are Part of the Supply Chain
2 min read
Sorry Blackberry: You Are Part of the Supply Chain
By Eric Byres on November 2, 2021

Today, reporters Betsy Woodruff Swan and Eric Geller at Politico published a story: “BlackBerry resisted announcing major flaw in software powering cars, hospital equipment.” They outline...

Continue Reading
Unpacking EO14028: Improving the Nation's Cybersecurity - Pt. 4
5 min read
Unpacking EO14028: Improving the Nation's Cybersecurity - Pt. 4
By Eric Byres on May 26, 2021

Section 3 - Less Fog, More Cloud Section 3: Modernizing Federal Government Cybersecurity of the Executive Order is all about government agencies moving to the cloud and doing it right. If...

Continue Reading
Loading more posts
No more posts to load
1 2

Stay up to date