Cybersecurity News Central

RunSafe Security Launches Powerful New Risk Reduction Analysis to Reveal Software Exposure to CVEs and Memory-Based Zero Days

security software risk reduction

RunSafe Security Launches Powerful New Risk Reduction Analysis to Reveal Software Exposure to CVEs and Memory-Based Zero Days

RunSafe Risk Reduction Analysis identifies known and unknown risk in embedded systems and quantifies total risk reduction with runtime protections applied

MCLEAN, Va., April 7, 2025 /PRNewswire/ — RunSafe Security, a pioneer of cyberhardening technology for embedded systems across critical infrastructure, announced the launch of its newest innovation, the RunSafe Risk Reduction Analysis, which analyzes total exposure to Common Vulnerabilities and Exposures (CVEs) and memory-based zero days in software. Designed for cybersecurity professionals and embedded systems developers, the solution provides much-needed insight into system vulnerabilities as well as data on how runtime mitigations can drastically reduce software exposure.

Critically, the RunSafe Risk Reduction Analysis, part of the company’s Identify solution, focuses on identification and mitigation of memory-based vulnerabilities, which are one of the most exploited classes of security flaws in modern embedded systems. Memory safety flaws leave software susceptible to attacks such as arbitrary code execution, privilege escalation, denial-of-service (DoS), and data theft. The Risk Reduction Analysis reveals total exposure to these critical flaws while measuring the risk reduction achieved when applying advanced runtime protections.

Joseph M. Saunders, Founder and CEO of RunSafe Security, said:

Memory safety issues continue to account for nearly 70% of vulnerabilities in embedded systems,

“With the Risk Reduction Analysis, we’re giving organizations the tools and insights to eliminate an entire class of vulnerabilities, significantly improving their resilience against remote code execution attacks and other exploits.”

The Risk Reduction Analysis works by analyzing a software binary or an SBOM to calculate the risk to embedded systems. The tool’s ability to quantify memory-based zero days is developed out of novel research from Linköping University and calculates the number of binary attack vectors, or return-oriented programming (ROP) chains, within software. In an example analysis, the tool revealed that software was exposed to 1.6 million potential ROP gadgets, but with runtime protections applied, there was a risk reduction of >98.28%.

As part of the launch, organizations will be able to access a live walkthrough of the Risk Reduction Analysis with sample data found here: https://app.runsafesecurity.com/sample-risk-reduction

For more information about RunSafe’s approach to protecting embedded software systems and shielding against memory-based exploits and advanced cyber threats, please visit https://runsafesecurity.com.

READ the latest news shaping the cybersecurity market at Cybersecurity News Central

RunSafe Security Launches Powerful New Risk Reduction Analysis to Reveal Software Exposure to CVEs and Memory-Based Zero Days, source

Follow us on LinkedIn!

Join our weekly newsletter!

Please enable JavaScript in your browser to complete this form.

Your Header Sidebar area is currently empty. Hurry up and add some widgets.