Eclypsium (@eclypsium) 's Twitter Profile
Eclypsium

@eclypsium

A supply chain security platform that builds trust in every device.

ID: 865342977442430978

linkhttps://www.eclypsium.com calendar_today18-05-2017 23:06:57

1,1K Tweet

1,1K Followers

208 Following

Eclypsium (@eclypsium) 's Twitter Profile Photo

Hidden threats could be lurking in your #AIdatacenter. 👀 On 7/16, join Eclypsium's #webinar to uncover the latest cyber risks targeting #GenAI infrastructure & learn how to defend your hardware, firmware & TEEs from sophisticated attacks. Register now: hubs.ly/Q03vG5400

Hidden threats could be lurking in your #AIdatacenter. 👀 On 7/16, join Eclypsium's #webinar to uncover the latest cyber risks targeting #GenAI infrastructure & learn how to defend your hardware, firmware & TEEs from sophisticated attacks. Register now:
hubs.ly/Q03vG5400
Eclypsium (@eclypsium) 's Twitter Profile Photo

The recent actively-exploited AMI BMC vulnerability (CVE-2024-5085) is difficult to mitigate, but not impossible. ▶️ Watch our quick video walkthrough to learn how Eclypsium can help: hubs.ly/Q03vSfX70

Eclypsium (@eclypsium) 's Twitter Profile Photo

On October 25, Microsoft will stop providing feature or security updates for Windows 10. If you're organization isn't in process of performing the migration, you're already behind. Get the details in our blog post here: hubs.ly/Q03v-_8N0 #Windows10 #Windows11 #OSsecurity

Eclypsium (@eclypsium) 's Twitter Profile Photo

Join Eclypsium's 7/16 #webinar on the hidden threats that could be lurking in your #AIdatacenter. 👀 We'll uncover the latest cyber threats targeting #GenAI infrastructure & show you how to defend your hardware, firmware & TEEs from attack. Register now: hubs.ly/Q03wgL2v0

Join Eclypsium's 7/16 #webinar on the hidden threats that could be lurking in your #AIdatacenter. 👀 We'll uncover the latest cyber threats targeting #GenAI infrastructure & show you how to defend your hardware, firmware & TEEs from attack. Register now:
hubs.ly/Q03wgL2v0
Eclypsium (@eclypsium) 's Twitter Profile Photo

In episode 53 of Eclypsium's #BelowtheSurface #podcast, Chase Cunningham, aka Dr. Zero Trust, joins Paul Asadoorian to discuss the current state and evolution of #ZeroTrust security. 🎙️Links to the full episode here: hubs.ly/Q03wlN0-0 #supplychainsecurity #Eclypsium

Eclypsium (@eclypsium) 's Twitter Profile Photo

Recently CISA added three critical vulnerabilities to the KEV catalog. In the latest #BelowtheSurface #podcast, our experts dive into BMC #vulnerabilities and the challenges associated with detecting and mitigating these vulnerabilities. 🎙️Listen today: hubs.ly/Q03wB8bW0

Eclypsium (@eclypsium) 's Twitter Profile Photo

We discovered CVE-2024-54085 (CVSS 10.0 Auth bypass in AMI MegaRAC BMC firmware) and disclosed it through proper channels back in 2024, then blogged about it in March 2025, and then it got added to Cybersecurity and Infrastructure Security Agency Known Exploited Vulnerabilities last week 😬

Eclypsium (@eclypsium) 's Twitter Profile Photo

We shipped some Nuclei templates to help folks detect CVE-2024-54085 (AMI MegaRAC BMC auth bypass). Here's a clip from the podcast episode where we discussed this vulnerability. Grab the Nuclei code from our most recent blog post.

Eclypsium (@eclypsium) 's Twitter Profile Photo

Netgear devices are a target for vulnerability research & exploitation due to their widespread use, role as network edge devices & challenge of securing firmware & managing patches. Our blog details why these risks persist, attack trends & what you can do: hubs.ly/Q03xtN7G0

Netgear devices are a target for vulnerability research & exploitation due to their widespread use, role as network edge devices & challenge of securing firmware & managing patches. Our blog details why these risks persist, attack trends & what you can do:
hubs.ly/Q03xtN7G0
Eclypsium (@eclypsium) 's Twitter Profile Photo

The AI infrastructure arms race is on, and cyber threats are escalating. Watch Eclypsium’s Executive Webinar on-demand to learn why #AIdatacenters are the cyber target of the century — and how to protect your critical hardware, firmware, & supply chain: hubs.ly/Q03xv4r50

The AI infrastructure arms race is on, and cyber threats are escalating. Watch Eclypsium’s Executive Webinar on-demand to learn why #AIdatacenters are the cyber target of the century — and how to protect your critical hardware, firmware, & supply chain:
hubs.ly/Q03xv4r50
Panasonic TOUGHBOOK (@toughbook) 's Twitter Profile Photo

Meade Maleki highlights why resilience and compliance are more critical than ever in today's cybersecurity landscape.🛡️ See how our Smart Compliance solution, powered by Eclypsium, can helps utility organizations protect customer information from threats. bit.ly/4llm4T5

Eclypsium (@eclypsium) 's Twitter Profile Photo

In response to recent cyberattacks, we're offering a free consultation & analysis of Salt/Volt Typhoon exposure & vulnerability for impacted organizations. If you think your environment may be a good candidate, request your complimentary assessment here: hubs.ly/Q03xJ-PM0

Eclypsium (@eclypsium) 's Twitter Profile Photo

Headed to Summer Camp this year? Eclypsium will be in full force at Black Hat & we'd love to talk Infrastructure supply chain security, new threats to network devices, + more. We're also co-hosting a party with @Intel at Ri-Ra. RSVP here! hubs.ly/Q03y95n90 #BlackHat2025

Headed to Summer Camp this year? Eclypsium will be in full force at Black Hat & we'd love to talk Infrastructure supply chain security, new threats to network devices, + more. We're also co-hosting a party with @Intel at Ri-Ra. RSVP here!
hubs.ly/Q03y95n90

#BlackHat2025
Eclypsium (@eclypsium) 's Twitter Profile Photo

On October 25, Microsoft will stop providing feature or security updates for Windows 10. If you're organization isn't in process of performing the migration, you're already behind. Get the details in our blog post here: hubs.ly/Q03yh9980 #Windows10 #Windows11 #OSsecurity

Eclypsium (@eclypsium) 's Twitter Profile Photo

Bare metal cloud services provide compelling performance advantages for AI workloads, but there are significant security trade-offs. Our blog post discusses the unique security challenges organizations should address before diving in. Read it now: hubs.ly/Q03yBQLW0

Bare metal cloud services provide compelling performance advantages for AI workloads, but there are significant security trade-offs. Our blog post discusses the unique security challenges organizations should address before diving in. Read it now:
hubs.ly/Q03yBQLW0
Eclypsium (@eclypsium) 's Twitter Profile Photo

In episode 55 of our #BelowtheSurface #podcast 🎙️ Eclypsium’s Paul Asadoorian, Vlad Babkin, Wes Dobry & Chase Snyder talk vulnerabilities impacting Netgear & Gigabyte devices, real-world implications of Rowhammer attacks & safeguarding your enterprise. ▶️ hubs.ly/Q03yZ5mY0

In episode 55 of our #BelowtheSurface #podcast 🎙️ Eclypsium’s Paul Asadoorian, Vlad Babkin, Wes Dobry & Chase Snyder talk vulnerabilities impacting Netgear & Gigabyte devices, real-world implications of Rowhammer attacks & safeguarding your enterprise.
▶️ hubs.ly/Q03yZ5mY0