RunSafe Security
  • Product
    • Platform Overview
      • RunSafe Identify – SBOM generation, license compliance & vuln identification
      • RunSafe Protect – Automated runtime code protection
      • RunSafe Monitor – Runtime monitoring solution
    • Integrations & Supported Platforms
      • Product Updates
      • Platform Pricing
  • Solutions
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Runtime Protection
      • Open Source License Compliance
      • Standards & Compliance
    • Teams
      • Product Leaders
      • Developers & Engineers
      • Industrial Asset Owners
      • Product Security Teams
  • Industries
    • Automotive
    • Medical Device
    • Aerospace and Defense
    • Industrial Automation
    • High-Tech Manufacturing
    • Energy
    • Railway
  • About Us
    • Our Story
    • Team
    • News
    • Press Releases
    • Awards
    • Contact
    • Partners
  • Resources
      • Learn
        • Blog
        • Podcasts
        • Webinars
        • Videos
        • Events
        • FAQ
      • Explore Solutions
        • Case Studies
        • Whitepapers
        • Reports
        • Evaluate Your SBOM
        • Total Cost of Ownership Calculator
        • Download Resources
        • Product Updates
      • Use Cases
        • Embedded Device Security
        • Software Supply Chain Security
        • OT/ICS Device Security
        • Military Embedded Systems
        • Advanced Driver Assistance Systems
        • Electronic Control Units
        • Connected Vehicle Security
        • Medical Device FDA Compliance
        • Secure Flight Control Systems
  • TALK TO EXPERT
  • Log In
%1$s
  • Product
    • Platform Overview
      • RunSafe Identify
      • RunSafe Protect
      • RunSafe Monitor
      • Integrations
      • Product Updates
      • Platform Pricing
      • Standards & Compliance
  • Solutions
    • Capabilities
      • C/C++ SBOM Generation
      • Identify Vulnerabilities
      • Runtime Protection
      • Open Source License Compliance
    • Teams
      • Product Leaders
      • Developers & Engineers
      • Industrial Asset Owners
      • Product Security Teams
    • Automotive
    • Aerospace and Defense
    • Energy
    • Railway
  • Industries
    • Medical Devices
    • Industrial Automation
    • High-Tech Manufacturing
  • About
    • Our Story
    • Team
    • News
    • Press Releases
    • Awards
    • Contact
    • Partners
  • Resources
    • Events
    • Blog
    • Case Studies
    • Whitepapers
    • Reports
    • Videos
    • Podcasts
    • Webinars
    • Evaluate Your SBOM
    • FAQ
      • Use Cases
        • Embedded Systems Protection
        • OT/ICS Device Security
        • Military Embedded Systems
        • Advanced Driver Assistance Systems
        • Electronic Control Units
        • Connected Vehicle Security
        • Medical Device FDA Compliance
        • Secure Flight Control Systems
  • TALK TO AN EXPERT
  • Log In
The Flood Is Here: What Claude Mythos and Project Glasswing Mean for Critical Infrastructure

The Flood Is Here: What Claude Mythos and Project Glasswing Mean for Critical Infrastructure

by Nicole Spewak | Apr 13, 2026 | Code Protection, Memory Safety, Uncategorized

Key Takeaways AI is exposing thousands of hidden software vulnerabilities. Anthropic’s Mythos uncovered confirmed bugs across major operating systems and browsers, including flaws that persisted for decades. Memory safety vulnerabilities pose a critical infrastructure...
Breaking Down the Top 15 Software Supply Chain Attacks

Breaking Down the Top 15 Software Supply Chain Attacks

by Nicole Spewak | Feb 4, 2026 | Software Supply Chain

Software supply chain attacks surged at the end of 2025, with 41 attacks uncovered in October alone. And there was an unmistakable pattern. Attackers stopped trying to breach organizations directly and instead focused on opportunities for widespread impact.  Why pick...
Safety Meets Security: Building Cyber-Resilient Systems for Aerospace and Defense

Safety Meets Security: Building Cyber-Resilient Systems for Aerospace and Defense

by Nicole Spewak | Nov 20, 2025 | Aerospace/Defense

In aerospace and defense, the line between safety and cybersecurity has disappeared. As aircraft and defense systems become increasingly software-defined and network-connected, the same architectures that deliver speed, agility, and capability also introduce new...
Memory Safety KEVs Are Increasing Across Industries

Memory Safety KEVs Are Increasing Across Industries

by Nicole Spewak | May 23, 2025 | Memory Safety, Uncategorized

Memory safety vulnerabilities are one of the most prevalent weaknesses in software, and the number of Known Exploited Vulnerabilities (KEVs) across industries are steadily increasing. In a webinar hosted by Dark Reading, RunSafe Security CTO Shane Fry and VulnCheck...
Understanding Memory Safety Vulnerabilities: Top Memory Corruption Bugs and How to Address Them

Understanding Memory Safety Vulnerabilities: Top Memory Corruption Bugs and How to Address Them

by Nicole Spewak | Feb 26, 2025 | Memory Safety, Uncategorized

Memory safety vulnerabilities remain one of the most persistent and exploitable software weaknesses. Memory corruption flaws, when exploited, allow attackers to execute arbitrary code, escalate privileges, bypass security controls, or crash or take over critical...
12»
Guide to Creating and Utilizing SBOMs
RunSafe White and Orange Logo

 Headquarters: 1775 Tysons Blvd, Fifth Floor McLean, VA 22102
 Huntsville Regional Office: 850 Ben Graves Dr NW, Huntsville, AL 35816
EMEA Office: Agnes-Pockels-Bogen 1 80992 Munich, Germany
+1 (571) 441-5076
Sales@RunSafeSecurity.com

  • Platform
  • Partners
  • News
  • Blog
  • FAQ
  • Contact
  • Subscribe to Newsletter
  • Slack Community Channel
TALK TO AN EXPERT
ISO/IEC 27001 Certified

© Copyright 2026 RunSafe Security. All Rights Reserved.

Privacy Policy      Terms 

  • Follow
  • Follow
  • Follow