Embedded Systems

A Timesys Deep Dive

November 2023

For an audio version of this newsletter to listen to, click below!

Cybersecurity in the news

Managing the Growing Tsunami of Vulnerabilities

The number of CVEs reported each year continues to rise and more importantly, the number of severe or critical CVEs uncovered yearly has risen as well.

With the number of newly discovered vulnerabilities reaching an all-time high for the sixth consecutive year, it is evident that organizations and individuals must prioritize their cybersecurity efforts. As highlighted by Infosecurity Magazine, the staggering increase in CVEs in 2022, the largest since 2017, has brought the total number of published CVEs over the past decade to over 192,000. Add the CVEs uncovered so far in 2023 alone, the total number of published CVEs is now over 218,000.

How do you sift through this massive volume of vulnerabilities to identify the ones that affect your devices?

Vigiles, our best-in-class Vulnerability Monitoring, SBOM Management, and Remediation tool, can help. Vigiles offers a comprehensive solution by combining a curated CVE database, continuous security feed based on your SBOM (Software Bill of Materials), powerful filtering capabilities, and easy triage tools. By leveraging Vigiles, you can proactively stay informed about the latest vulnerabilities and potential threats without being blindsided.

The curated CVE database ensures that only relevant and impactful vulnerabilities are presented, saving you valuable time and resources.

Vigiles, our SBOM management and CVE monitoring and remediation tool combines a curated CVE database, continuous security feed based on your Software Bill of Materials (SBOM), powerful filtering, and easy triage tools so you get automatic alerts of critical vulnerabilities affecting your devices. 

Vigiles Update

Introducing Vigiles-CLI for Enhanced SCA Management

In our continuous effort to enhance your experience with Vigiles, our robust Software Composition Analysis (SCA) tool, we’re excited to introduce vigiles-cli – a new command-line tool that revolutionizes how you interact with Vigiles APIs. This addition is a game-changer for users of Vigiles, especially in monitoring and managing CVEs in embedded Linux device SBOMs and other ecosystem SBOMs.

What sets vigiles-cli apart is its seamless integration with third-party SBOM generation tools like “syft”, making your workflow smoother and more efficient. This means not only faster and more accurate SBOM generation but also a significant reduction in false positives, streamlining your path from CVE discovery to remediation and documentation. It’s all about enhancing accuracy and efficiency in your security management process.

We encourage you to explore this new feature and see firsthand how it transforms your Vigiles experience. For more details and to get started with vigiles-cli, visit our Git project page. Your journey towards a more secure and efficient software ecosystem just got an upgrade!

Challenges of Staying Secure

How do you keep your products secure for their entire lifecycle and maintain them after release?

Are you stressed out by all the security issues in the world of embedded Linux devices? You’re not alone. Every day brings new problems that could threaten your product. It’s hard to make sure you’re doing everything right from the beginning and keeping it up as your product lives on. If something goes wrong, it could really harm your brand, make customers lose trust, or even lead to legal problems and big fines. It feels like you’re walking through a field, trying not to step on a problem.

We understand how overwhelming and stressful it can be to secure your embedded devices, so we’ve taken our 20+ years of embedded development experience to distill security into three easy steps:

  1. Implement security early in the design process with VigiShield Secure by Design, an easy-to-understand, PSA certified, maintainable Yocto security layer.
  2. Stay compliant and on top of vulnerabilities with Vigiles, a SCA SBOM and CVE tool.
  3. Maintain security and keep your devices up-to-date for their complete lifecycle with Linux OS and BSP Maintenance, a service that provides long-term security updates and maintenance of your devices.

Discover how our VigiShield, Vigiles, and BSPM service can help you stay ahead of security threats, ensure product longevity, and save you both time and money. Schedule a call with our experts today to learn more about how we can transform your embedded Linux experience.

Introduction to Containers on Embedded Linux

How can containers help solve a myriad of problems, including enabling legacy applications to run on newer embedded targets?

Containerized applications been a common solution in the server and even desktop space for quite a while, but how can they be leveraged in embedded projects to help decouple application development from the development of the embedded platform itself in timelines, teams, and tools? Learn how they can even allow application developers to work on desktop or workstation targets, then later deploy to the actual target hardware with this blog:

Timesys Newsletter

Share this newsletter with your colleagues and team!

Timesys-India-Team-Goa

You can share this newsletter by clicking above!

Learn with Timesys

How do you choose the right SBOM generation tool?

timesys embedded board farm zombies<br />

Choosing the right SBOM generation tool plays a pivotal role in open source security, compliance, and project efficiency. But it can be a daunting and challenging task to select the right one, given the wide array of options available and ecosystems to work within. To help you simplify the process of evaluating and comparing SBOM generation tools, we’ve curated a selection of the top ones, analyzed them based on key criteria, and identified which tool is best for which ecosystem. You can check out our new series on “Choosing the Right SBOM Generation Tool” below!

From Regulatory Uncertainty to Expertise:

SBOM, CVE, and Beyond – Your Roadmap to Medical Compliance Confidence and Brand Protection

December 14 @ 12 PM EDT / 9 AM PT

In this live webinar and Q&A session, you’ll explore SBOM and CVE management and discover how to keep your products and devices compliant without complicating your development process. Say goodbye to complicated and unruly compliance processes and hello to efficient compliance practices that drive business growth! Your path to compliance clarity starts here!

 

Can’t make it on December 14th? Reply to this email and we’ll send you the event recording, or watch previous webinars here.

Learn More

 

October 2023

Worst Security Problem Found in cURL” Highlights Need for SBOMs and 1-Click Remote Attack CVE Discovered in libcue

Critical Zero-Day Vulnerability
 

September 2023

Critical Zero-Day Vulnerability” Recently Disclosed In The Webp Image Library and 7 More Vulnerabilities Exposed

New OpenSSH Vulnerability “allows a remote attacker to execute arbitrary commands
 

August 2023

New OpenSSH Vulnerability “allows a remote attacker to execute arbitrary commands

Bringing back the stack attack
 

July 2023

Bringing back the stack attack