Videos

Overcoming the Odds: Empower Your Defense with RunSafe Security

During recent Congressional testimony, FBI Director Ray highlighted the daunting challenge posed by cyber warfare in his address to the House Select Committee on the Chinese Communist Party. Despite the potential of directing all FBI cyber assets toward countering China's hacking teams, they would still be outnumbered by an alarming 50-to-one ratio. This revelation underscores the urgent need for a strategic and innovative approach. Traditional methods of increasing manpower are insufficient to bridge such a significant gap. That's where RunSafe's techniques come into play, offering defenders a remarkable advantage in the face of overwhelming odds. At RunSafe, we introduce our advanced Cyber Defense Strategy using memory safety mitigation technology. Organizations using our programs have seen remarkable results. In just half an hour of implementation, they've achieved savings equivalent to four labor years. Imagine the transformative impact when applied across entire platforms! We are actively collaborating with esteemed partners like the Navy to demonstrate the unparalleled benefits of our approach. Through our research, we've found that RunSafe provides defenders with an astonishing 3,000-to-one advantage. This means they can redirect their focus from chasing individual bugs to strengthening vulnerabilities elsewhere, effectively neutralizing one of the most reliable attack vectors. With RunSafe's solutions, you can shift the balance of power in your favor against cyber threats. Liberate your resources to tackle more challenging endeavors and stay ahead in the dynamic landscape of cyber warfare. Empower your defense with RunSafe and safeguard your organization's digital assets effectively. Don't succumb to overwhelming odds—take charge of your cybersecurity strategy today!

Understanding and Mitigating Memory-Based Exploits with RunSafe

CVE-2020-8597 is a critical buffer overflow vulnerability found in the Point-to-Point Protocol Daemon (PPPD), affecting versions 2.4.2 to 2.4.8. This exploit is especially dangerous due to the widespread use of PPPD in many embedded Linux distributions, including Debian and Ubuntu. Despite the seemingly small range of affected versions, this vulnerability poses a significant threat because the software is a stable stack that doesn't receive frequent updates. Consequently, it has been around for 17 years, embedding itself in numerous systems. PPPD's vulnerability is a classic buffer overflow, allowing attackers to execute arbitrary code and take control of the system. The severity of this exploit is underscored by its CVSS V3 score of 9.8, classifying it as critical. Notably, the vulnerability affects not just a few software versions but also over 19 vendors, including Siemens, Wind River Linux, Sierra Wireless, OpenWRT, and even Android. What makes this exploit particularly dangerous is its simplicity. Some Linux-based builds, like Yocto and Wind River, lack basic protections such as compiling with position-independent code, making exploitation straightforward. Reliable working exploits for this vulnerability are readily available online, posing a significant risk to unprotected systems. RunSafe addresses these critical vulnerabilities by removing the attacker's ability to execute return-oriented programming (ROP) gadgets. This method ensures that even if a buffer overflow exists, the attacker cannot run arbitrary code in the process space. By deploying RunSafe's solutions, vulnerabilities like CVE-2020-8597 are effectively mitigated.

Embracing Rust: RunSafe Code's Transition from C++ for Enhanced Stability and Safety

In our search for enhanced stability and safety, RunSafe Code, or Load-time Function Randomization (LFR), recently underwent a significant transition from C++ to Rust programming. We recognized the inherent advantages Rust offers over traditional C++ programming, particularly in terms of memory safety. Our transition to Rust allowed us to address critical issues surrounding memory unsafety, particularly concerning raw memory access. By leveraging Rust's language benefits, we meticulously adjusted memory permissions and organized byte slices, ensuring safer interactions with the process's memory space. Moreover, by sharing the same implementation across multiple phases of LFR, we've effectively reduced the size of our codebase while improving overall code coverage and robustness. One of the highlights of our transition was our rigorous testing methodology, where we compared Rust and C++ implementations to maintain byte-for-byte accuracy. By running both implementations in the same process and scrutinizing the entire memory space, we rapidly identified and addressed any discrepancies, ensuring a seamless transition. Embrace the future of programming languages by staying up-to-date on the newest RunSafe Security Minute. Dive deeper into our journey of transitioning RunSafe Code to Rust for enhanced stability and safety.

Transforming Automotive Security

In today's automotive industry, vehicles are more than mere transportation—they're complex systems reliant on software and connectivity. This evolution presents new challenges, particularly in terms of cybersecurity. RunSafe emerges as a pivotal innovator in fortifying embedded systems within automobiles. With regulatory mandates like regulations R155 and R156 in Europe emphasizing cybersecurity, RunSafe steps in to seamlessly integrate advanced cyber defenses into automotive systems. RunSafe provides a comprehensive approach to address vulnerabilities, from software bill of materials (SBOM) to vulnerability identification and mitigation. By partnering with RunSafe, automakers can ensure the safety of their consumers and reinforce confidence in their products. RunSafe not only protects against potential cyber threats but also enhances the overall security posture of automobiles, making roads safer for everyone. With RunSafe, the automotive industry gains a competitive edge in addressing digital security challenges. By prioritizing security without compromising functionality, RunSafe ensures that automobiles remain at the forefront of innovation and safety.

RunSafe’s Path to Ensuring Flight Safety Certification

In today’s RunSafe Security Minute, we’re exploring how RunSafe is working to achieve safety of flight certification in aviation safety. With the expertise of AFuzion, a leader in avionics software development, we are making significant strides toward this goal. RunSafe Code is divided into two main components, each serving a different purpose. The first component functions on the ground and requires qualification rather than certification. This process is guided by DO-330, which involves tool qualification essential for certifying airborne systems. We aim to achieve Tool Qualification Level 1, the highest level, allowing our Code to be used in the development of critical flight software. The second component operates during flight and must adhere to the certification guidelines outlined in DO-178. As a module, RunSafe provides all necessary documentation for DO-178 certification at Design Assurance Level A (DAL A) to the airborne system's owner. This ensures that RunSafe Code can be integrated into any system requiring a safety of flight, ensuring top-tier aviation safety.

Aviation Safety: Understanding Safety of Flight Certification

The Safety of Flight Certification is the process used by aviation authorities like the Federal Aviation Administration (FAA) to ensure the safety and reliability of any airborne system operating in regulated airspace. This certification process is vital for maintaining high safety standards across the aviation industry, encompassing everything from commercial airliners to smaller private aircraft. The FAA publishes certification standards such as DO-178, which provide detailed guidance on developing products that are compatible with the safety of flight requirements. These standards are comprehensive, applying to specific system components, including hardware and software. Whether it's the aircraft's engines, avionics, or in-flight entertainment systems, every part must meet stringent safety levels corresponding to the potential risks of failure. One of the key aspects of the Safety of Flight Certification is that it needs to be integrated from the beginning of the product development process. Safety considerations must be "baked in" to the design and development stages, ensuring that all applicable standards are adhered to throughout the engineering lifecycle. This requires meticulous documentation and thorough planning for each component of the system. Verification and validation are critical components of this process. Verification ensures that the system meets all specified requirements, while validation confirms that the system performs its intended functions safely and reliably. These steps are essential for demonstrating that the system can operate safely within the highly regulated environment of modern airspace. Once the verification and validation phases are completed, aviation authorities conduct a thorough review of the product. This review determines whether the product has followed all the required standards and can be certified as safe for flight. The certification process is rigorous and detailed, reflecting the critical importance of safety in aviation. By ensuring that every airborne system meets the highest safety standards, Safety of Flight Certification plays a crucial role in maintaining the safety and reliability of air travel. From the engines to the entertainment systems, every component on an aircraft must be certified to ensure the overall safety of the flight.

Streamline Yocto Security with RunSafe SBOM Integration

With the increasing complexity of software development, identifying and mitigating security vulnerabilities has become a critical aspect of the development lifecycle. At RunSafe, we recognize the challenges faced by developers and organizations in maintaining the security of their software projects, particularly in the realm of embedded systems development. Yocto, a popular framework for building embedded Linux distributions, offers powerful tools for creating customized systems. However, like any software development process, security remains a top concern. That's where our RunSafe SBOM integration comes into play. SBOM, or Software Bill of Materials, provides a comprehensive inventory of the components within a software system, enabling developers to identify and address potential security vulnerabilities effectively. Our RunSafe SBOM layer for Yocto SBOM generation simplifies this process, making it easy for developers to generate and analyze SBOMs for their Yocto projects. By integrating our SBOM layer into your Yocto workflow, you gain access to a wealth of information about the software components within your project, including any known vulnerabilities. But we don't stop there. With our web application, you can seamlessly upload your generated SBOM and gain insights into the vulnerabilities present in your software ecosystem. Our intuitive interface provides detailed information about each vulnerability, empowering you to make informed decisions about your project's security posture. What sets RunSafe apart is our commitment to providing practical solutions to security challenges. Through our special integration for Yocto users, we offer a unique layer that enables effortless mitigation of identified vulnerabilities using RunSafe's proprietary code. With this integration, you can ensure the resilience of your Yocto projects and mitigate potential security risks effectively.

Mandating Transparency: The Role of Software Bill of Materials (SBOM) under the CRA

The European Union's Cyber Resilience Act (CRA) is reshaping cybersecurity standards across member nations. The CRA mandates manufacturers to incorporate a Software Bill of Materials (SBOM) in formats such as CycloneDX and SPDX. This SBOM serves as an inventory of software dependencies, promoting transparency and accountability. While sharing the SBOM with entities like the European Union Agency for Cybersecurity (ENISA) and market surveillance authorities is compulsory upon request, there is no obligation to make this information public. The CRA covers a broad spectrum, including operating systems, network monitoring tools, and certificate issuers. However, open-source projects developed without commercial intent are exempt from these regulations, alleviating the burden on the open-source community. The CRA serves as a model for the global standardization of secure-by-design practices, highlighting governments' commitment to cybersecurity. This legislation represents a significant step towards fortifying digital resilience in an interconnected world. Advocate for standardized cyber resilience practices worldwide and witness how the CRA demonstrates governmental commitment to cybersecurity. Stay tuned for updates on this legislation as it shapes the future of cybersecurity.

Leading the Way with Secure-by-Design

Over a year ago, we started re-implementing our randomization library using Rust. Even though it wasn’t an immediate attack vector, we prioritized security and pushed forward with the rewrite. This crucial update will be featured in our upcoming 5.x release of RunSafe Code, enhancing our software's robustness and security. Transparency is key to secure-by-design, which is why we’re making software build materials (SBOMs) public for all our offerings. This allows our customers to inspect and report any vulnerabilities they find, helping them stay informed and secure. By providing SBOMs, we ensure you know exactly when and why to update RunSafe Code in your systems. Furthermore, we are expanding our repository offerings to include more packages for Debian, Red Hat, and Docker environments. These new packages will also come with SBOMs, offering hardened versions of existing open-source software and detailed information for seamless deployment. These updates are just the beginning. We have many more exciting projects in the secure-by-design space that we can't wait to share with you. Stay tuned for more.

Protect Your System with RunSafe Tools

Are you concerned about the security of your critical systems in the face of ever-evolving vulnerabilities? Are you worried you’ll miss a threat since the NVD is lacking key data? Look no further than RunSafe. Our cutting-edge tools, including the Attack Surface Risk Index (ASRI) and Software Bill of Materials (SBOMs), are designed to empower our customers with the best-in-class CPE data sourced from a diverse range of reliable outlets, including the esteemed National Vulnerability Database. We understand the importance of minimizing coverage gaps, which is why we leave no stone unturned in providing comprehensive protection. With RunSafe, even in scenarios where information is scarce, our innovative Code ensures that our customers remain shielded from potential threats. Gone are the days of reactive panic mode, where finding new data sources becomes a frantic scramble. Instead, RunSafe empowers users to adopt a proactive stance towards security, ensuring continuous protection against vulnerabilities. By leveraging RunSafe's advanced technology and robust data sourcing strategies, our customers can confidently navigate the ever-changing threat landscape. Our commitment to proactive security measures enables organizations to mitigate risks effectively and maintain the integrity of their systems. Don't let vulnerabilities compromise your critical system's security posture. Embrace RunSafe today and experience the peace of mind that comes with staying ahead of threats. With RunSafe, you can fortify your defenses, safeguard your assets, and uphold the resilience of your infrastructure. Take the proactive approach to security with RunSafe and protect what matters most. Join us as we navigate evolving vulnerability assessments, RunSafe’s solutions, and other cybersecurity updates as we empower viewers with the knowledge and insights needed to stay ahead of emerging threats.

Navigating NVD's Changes: Implications for Vulnerability Assessments

In this video, we discuss the recent changes announced by the National Vulnerability Database (NVD) and their significant impact on vulnerability assessment practices. As of February 15, 2024, the NVD made a pivotal decision to curtail the publication of crucial information, signaling a shift in how individuals and businesses navigate cybersecurity vulnerabilities. Specifically, the NVD ceased the practice of matching Common Vulnerabilities and Exposures (CVEs) to Common Platform Enumerations (CPEs), causing ripples throughout the cybersecurity community. This alteration disrupts the conventional approach to safeguarding products, as it impedes the ability to swiftly identify vulnerabilities associated with specific hardware or software configurations. Previously, users could readily access information on emerging vulnerabilities and tailor their protective measures accordingly. However, with the discontinuation of CVE-to-CPE mapping, this process becomes increasingly challenging, leaving many individuals and organizations grappling with the evolving threat landscape. This update underscores the importance of having a reliable method to stay updated on current and growing threats. As threats continue to evolve and diversify, proactive measures become paramount. RunSafe aims to provide insights and updates on emerging trends, including vulnerability assessment methodologies and the latest vulnerabilities affecting digital environments. By understanding these changes and adapting strategies accordingly, individuals and businesses can enhance their resilience against cyber threats. Moreover, we explore the implications of NVD's decision on RunSafe, a critical component in fortifying software against cyber attacks. RunSafe solutions rely on accurate and timely vulnerability data to effectively mitigate risks and bolster the security posture of software systems. Thus, understanding how these changes impact RunSafe implementations is essential for ensuring robust cybersecurity measures. Join us as we navigate evolving vulnerability assessments, RunSafe’s solutions, and other cybersecurity updates as we empower viewers with the knowledge and insights needed to stay ahead of emerging threats.

3 Core Issues Shaping Space Cybersecurity

As cybersecurity threats expand beyond our atmosphere, the need to protect important systems becomes even more critical. Space infrastructure security is more important than ever as technology advances and we rely more on satellites for communication, navigation, weather forecasting, and other essential services. The increasing connection between space technology and industries like energy, transportation, agriculture, and telecommunications makes it vital to have strong cybersecurity in space. Recent events have shown how important it is to improve security in space. The conflict in Ukraine highlighted the risk to commercial satellites from cyber threats when Russia targeted them. This event made it clear that we need better security measures to protect our space infrastructure. Understanding the three main issues in space cybersecurity today is essential.

Link Between Space Technology and Critical Industries

Satellites are crucial for modern infrastructure – global communication networks, precision agriculture, and efficient transportation systems. Protecting these assets is not just about safeguarding data, but also ensuring that vital services relying on space infrastructure continue uninterrupted.

Rise of Hybrid Military and Commercial Networks

The combination of military and commercial satellite communications brings new challenges for security. Managing access controls, encryption protocols, and threat detection becomes more complex as military and civilian operations share satellite resources. It’s important to ensure data integrity and confidentiality in these networks to maintain national security and economic stability.

Economic Shift Towards Operational Expenses

Satellite maintenance is an ongoing, necessary expense. To keep them functioning properly, there must be cost-effective cybersecurity solutions that maintain performance and reliability without compromising protections. As satellites' lifespans increase and their capabilities grow, resources must be allocated to maintain and secure these assets throughout their lifecycle. At RunSafe Security, we understand the importance of optimizing space assets for efficiency and ensuring strong cybersecurity measures are in place. Our approach focuses on software-based solutions that minimize disruption to space infrastructure's physical characteristics. By prioritizing cybersecurity without sacrificing operational efficiency, we aim to provide comprehensive protection for critical infrastructure beyond Earth's atmosphere.