News Room

Eclypsium®’s industry-leading firmware threat research has been featured in publications including Wired, Bloomberg, Dark Reading, Threatpost, Politico and Ars Technica.

Featured Coverage

Podcasts and Videos

BMCs manufactured by Quanta Cloud Technology (QCT) are still vulnerable to Pantsdown
The BIOS Disconnect
All Our Devices and Privacy on the Web
Dell Bug Puts 30 Million PCs at Risk
Thermostat Hijacking, MA Androids, Windows 11, Hacking Pelotons, & John McAfee
All Our Devices Aren’t Belong 2 Us
Hackers Are Targeting Your Firmware. Are You Ready?
Vulnerability Research or Computer Fraud & Abuse ?
Cracks in the Foundation: Understanding the New Endpoint Challenge
ESW interviews John Loucaides on #BootHoleVulnerability
Rite Aid Used Facial Recognition Cameras; BootHole Hits GRUB2
This Week in Linux 111: Linux 5.8, BootHole & GRUB2 Flaws, Firefox 79, JellyFin, Nitrux, & More
There’s a Hole in my Boot!
Is BOOTHOLE the WORST Vulnerability We’ve Ever Seen?
GNU GRUB2 Vulnerability, ‘BootHole’ Secure Boot Threat, & Garmin Ransomware Hack – PSW #660
Consumer VPNs; Tails 4.9; Browser Updates; GRUB2 Vuln; Facial Recognition and Masks
BootHole may be tough to patch.
Hidden dangers inside Windows and LINUX computers
Decipher podcast: Eclypsium’s Rick Altherr on Perilous Peripherals
Hundreds of Millions of Components Still Have Hackable Firmware
Eclypsium’s John Loucaides in an RSA pre-show interview
Eclypsium’s John Loucaides discussed the unprotected attack surface of the enterprise on Paul’s Security Weekly
Why direct-memory attacks on laptops just won’t go away
On the Metal: Eclypsium’s Rick Altherr
Attack Other People’s Refrigerators
Orrin Inside
Yuriy Bulygin – CEO and co-founder, Eclypsium
Post Vegas edition, more news than we can handle
The CyberWire Daily Podcast
Security Industry Briefings Update – Enterprise Security Weekly #136
RSAC 2019 Recap – Enterprise Security Weekly #129
Supermicro hardware weaknesses let researchers backdoor an IBM cloud server

In the News

Intel Chipset Firmware Actively Targeted by Conti Group
Conti spotted working on exploits for Intel Management Engine flaws
Cybercriminals look to exploit Intel ME vulnerabilities for highly persistent implants
Conti Leaks Reveal Ransomware Gang’s Interest in Firmware-based Attacks
Conti ransomware targeted Intel firmware for stealthy attacks
Leaks Show Conti Ransomware Group Working on Firmware Exploits
Omnipotent BMCs from Quanta remain vulnerable to critical Pantsdown threat
Pantsdown’ BMC vulnerability still present in Quanta servers
Quanta Servers Caught With Pantsdown BMC Vulnerability
QCT Servers Affected by ‘Pantsdown’ BMC Vulnerability
Critical ‘Pantsdown’ BMC Vulnerability Affects QCT Servers Used in Data Centers
Critical ‘Pantsdown’ BMC Vulnerability Affects QCT Servers Used in Data Centers
Critical ‘Pantsdown’ BMC Vulnerability Affects QCT Servers Used in Data Centers
Three years after ‘pantsdown’ baseboard vulnerability, pants are still down
Vulnerabilities and exploits: Pantsdown, ChromeLoader. Ransomware campaign updates. CISA Known Exploited Vulnerabilities.
Some QCT servers vulnerable to ‘Pantsdown’ flaw say security researchers
Cybercriminals Are Weaponizing MikroTik Devices: Here’s How
In the Fight Against Cybercrime, Takedowns Are Only Temporary
300,000 MikroTik routers are ticking security time bombs, researchers say
Lack of Patching Leaves 300,000 Routers at Risk for Attack
Millions of Windows 10 PCs exposed by nasty security vulnerability
Researchers Found a Vulnerability in All Windows PCs Since 2012
Microsoft WPBT flaw lets hackers install rootkits on Windows devices
A New Bug in Microsoft Windows Could Let Hackers Easily Install a Rootkit
Everyone Gets a Rootkit
Eclypsium Detects Severe Vulns in Accellion FTA Devices
Carahsoft Adds 95 Vendors to ITES-SW2 Contract
GeekWire 200 rankings update
Microsoft scraps with security analysts over vulnerability in secured-core PCs
Secured-Core PCs May Mitigate Firmware Attacks, but Adoption Lags
Critical, Exploitable Flaws in NETGEAR Router Firmware
Microsoft and Eclypsium lock horns over Dell SupportAssist flaws on secured-core PCs
Eclypsium: BIOSConnect Flaws Haunt Millions of Dell Computers
Preinstalled Firmware Updater Puts 128 Dell Models at Risk
Dell SupportAssist Exposed 30 Million PCs To Potential Remote BIOS Hack, Update Now
Millions of Dell PCs can be hacked remotely — here’s what you need to know
30 Million Dell Devices Have Preinstalled Software With ‘Severe’ Security Flaws
Faulty update mechanism puts millions of Dell devices at risk
Vulnerabilities in Dell computers allow RCE at the BIOS/UEFI level
Eclypsium Discovers Multiple Vulnerabilities Affecting 128 Dell Models via Dell Remote OS Recovery and Firmware Update Capabilities
BIOS Disconnect: New High-Severity Bugs Affect 128 Dell PC and Tablet Models
Dell SupportAssist bugs put over 30 million PCs at risk
Dell BIOSConnect flaws affect 30 million devices
BIOSConnect code execution bugs impact millions of Dell devices
30M Dell Devices at Risk for Remote BIOS Attacks, RCE
Flaws in Dell’s over-the-air device recovery and update impacts millions of devices
A Well-Meaning Feature Leaves Millions of Dell PCs Vulnerable
10 old software bugs that took way too long to squash
Hacker Known as Max Is a 55-Year-Old Woman, Prosecutors Say
Eclypsium partners with SecureCraft to extend distribution of its enterprise device integrity platform
New infosec products of the week: May 21, 2021
The 15 Hottest Cybersecurity Products At RSA Conference 2021
Eclypsium Selected for Enterprise Device Security Research
Eclypsium’s enhanced offering extends security to network and unmanaged devices
Eclypsium Improves Device Visibility
Eclypsium’s enhanced offering extends security to network and unmanaged devices
Eclypsium Enhances Platform to Extend Deep Visibility and Security to Network and Unmanaged Devices
Eclypsium Awarded AFWERX SBIR Phase One Contract to Explore Air Force Use of Enterprise Device Security Platform
Supply chain risk: Addressing a multitude of single points of failure
Will the CodeCov breach become the next big software supply chain hack?
Don’t Let the Fox Watch the Henhouse: Securing Firmware
Supermicro, Pulse Secure release fixes for ‘TrickBoot’ attacks
GRUB2 boot loader maintainers fixed hundreds of flaws
As SolarWinds spooks tech firms into rechecking code, some won’t like what they find
Ransomware’s Next Nasty Surprise: Pay Up Or We’ll Brick Your PC’s UEFI Firmware
TrickBot explained: A multi-purpose crimeware tool that haunted businesses for years
Trickbot Now Uses a Bootkit to Attack Firmware
Trickbot trojan takes aim at vulnerabilities in booting process
TrickBot’s New Tactic Threatens Firmware
TrickBot Returns with a Vengeance, Sporting Rare Bootkit Functions
TrickBot Malware Scans Systems for UEFI/BIOS Vulnerabilities
Updated Trickbot malware threatens firmware security
New Trickbot variant can interfere with UEFI and BIOS
TrickBot’s new module aims to infect your UEFI firmware
TrickBot adds firmware tool that researchers say could lead to ‘bricking’ devices
One of the Internet’s most aggressive threats could take UEFI malware mainstream
TrickBot Malware Gets UEFI/BIOS Bootkit Feature to Remain Undetected
Dangerous Trickbot evolves to target UEFI/BIOS firmware
New TrickBot version can tamper with UEFI/BIOS firmware
TrickBot gets new UEFI attack capability that makes recovery incredibly hard
The Internet’s Most Notorious Botnet Has an Alarming New Trick
When BYOD Also Means Bring-Your-Own-Cyber Risk
Rare Firmware Rootkit Discovered Targeting Diplomats, NGOs
Rare case of UEFI hacking hit targets interested in North Korea, Kaspersky says
Enterprise Device Security Company Eclypsium Raises $13 Million
Oregon Tech Portland cybersecurity startup Eclypsium raises $13 million in new investment
Security firm Eclypsium raises $13M
Portland-based hardware security startup Eclypsium raises $13M
Eclypsium® Awarded Emerging Technology Company of the Year by Technology Association of Oregon
How to stop hacking… before the OS starts up
New Report: How Behavioral Analytics Help FIs Block Fraud At The ITM
BootHole Shows Need for Greater Scrutiny
NSA issues BootHole mitigation guidance
The fixes to the Linux BootHole fixes are in
NSA and CISA push guidance for BootHole fix
Boot-Loading Flaw Affects Linux, Windows Devices
Red Hat’s BootHole Patches Cause Systems to Hang
BootHole fixes causing boot problems across multiple Linux distros
NSA warns of GRUB2 BootHole vulnerability
Dealing with a Hole in Secure Boot
Eclypsium researchers find hole in Linux bootloader GRUB2
Red Hat Enterprise Linux runs into Boothole patch trouble
Microsoft Security Advisory Highlights ‘BootHole’ Vulnerability in Systems with Secure Boot
Scary ‘BootHole’ flaw puts Windows, Linux PCs at risk: What to do
Servers at risk from “BootHole” bug – what you need to know
BootHole and Seven Other Vulnerabilities Patched in GRUB2, Update Your Distros Now
Bug in widely used bootloader opens Windows, Linux devices to persistent compromise
Billions of Windows and Linux devices at risk of hijacking
Companies Respond to ‘BootHole’ Vulnerability
BootHole vulnerability puts Windows, Linux systems at risk
New ‘BootHole’ security Vulnerability revealed, puts millions of systems at risk including Linux and Windows OS
BootHole exposes billions of devices to attack
‘BootHole’ Vulnerability Puts Billions Of Windows, Linux Systems At Risk
Boothole vulnerability puts billions of Windows and Linux devices at risk
Linux distros fix new Boothole bug
Linux GRUB2 bootloader flaw breaks Secure Boot on most computers and servers
New BootHole Vulnerability Affects Billions of Devices, Compromises GRUB2 Boot-loader
Critical GRUB2 Bootloader Bug Affects Billions of Linux and Windows Systems
New BootHole Vulnerability Revealed, Impacts Billions of Devices
Billions of Devices Impacted by Secure Boot Bypass
‘Boothole’ threatens billions of Linux, Windows devices
New flaw neuters Secure Boot, but there’s no reason to panic. Here’s why
A flaw in the GRUB2 bootloader allows hackers to bypass Secure Boot on billions of systems
‘BootHole’ Vulnerability Exposes Secure Boot Devices to Attack
GRUB2, you’re getting too bug for your boots: Config file buffer overflow is a boon for malware seeking to drill deeper into a system
New bug in PC booting process could take years to fix, researchers say
“Boothole” Bootloader Flaw Breaks Security on Most Linux, Windows Devices
‘BootHole’ Flaw Allows Installation of Stealthy Malware, Affects Billions of Devices
Researchers disclose widespread bootloader vulnerability
‘BootHole’ bug puts most Linux, Windows systems in jeopardy
BootHole GRUB2 Bootloader Security Exploit Discovered, Affects Billions Of Windows And Linux Devices
BootHole GRUB bootloader bug lets hackers hide malware in Linux, Windows
Newly discovered Linux and Windows vulnerability opens the door to hackers
Serious BootHole vulnerability puts millions of systems at risk
‘BootHole’ attack impacts Windows and Linux systems using GRUB2 and Secure Boot
‘BootHole’ Secure Boot Threat Found In Most Every Linux Distro, Windows 8 And 10
New BootHole flaw in Secure Boot affects a huge number of Linux and Windows systems
Privilege escalation explained: Why these flaws are so valuable to hackers
Newly discovered vulnerabilities could allow more persistent and destructive attacks on popular models of ATM and POS devices
Faulty Drivers Fuel ATM Hacking Problem, Say Researchers
Vulnerable drivers can enable crippling attacks against ATMs and POS systems
Driver Vulnerabilities Facilitate Attacks on ATMs, PoS Systems
Screwed Drivers Open ATMs to Attack
Digital disruption grows attack surface
A CMMC Approach to Address Firmware Vulnerabilities and Ensure Device Integrity
Thunderbolt Flaws Expose Millions of PCs to Hands-On Hacking
Eclypsium Named a Cool Vendor in the May 2020 Gartner Cool Vendors in Security Operations and Threat Intelligence Report
Eclypsium Delivers Essential, Comprehensive Solutions for Protecting the Enterprise from Firmware Threats
The 2020 OODA Cybersecurity Watch List – Eclypsium
Securing the stack – a 2020 imperative
Intel Security Gap Hard to Exploit Without Physical Data Center Access
These are the most innovative security companies of 2020
Eclypsium Named to Fast Company’s Annual List of the World’s Most Innovative Companies for 2020
Unfixable flaw in nearly all Intel chips released in the last five years could allow cyber criminals to hijack computers and wreak ‘utter chaos’
5 years of Intel CPUs and chipsets have a concerning flaw that’s unfixable
Rootkit in the Cloud: Hacker Group Breaches AWS Servers
Hundreds of Millions of PC Components Still Have Hackable Firmware
Perilous peripherals: Fake firmware warning after 5 years of inaction
Eclypsium security report shows unsigned firmware as ongoing headache
Unsigned Firmware Puts Windows, Linux Peripherals at Risk
Hackable firmware lurks inside Dell, HP and Lenovo computers amid supply chain security efforts
Lack of firmware validation for computer peripherals enables highly persistent attacks
Failure to sign firmware updates put Windows and Linux devices at risk
New research from cybersecurity firm Eclypsium finds that unsigned firmware is a major security problem
What does a Lenovo touch pad, an HP camera and Dell Wi-Fi have in common? They’ll swallow any old firmware, legit or saddled with malware
Modern Laptops and Network Cards Still Using Unsigned Firmware
Millions Of Windows And Linux Systems Are Vulnerable To This ‘Hidden’ Cyber Attack
Lack of firmware validation for computer peripherals enables highly persistent attacks
Don’t Trust, Just Verify
Windows, Linux Devices at Risk Due to Unsigned Peripheral Firmware
Lack of firmware validation for computer peripherals enables highly persistent attacks
Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs
Five years after the Equation Group HDD hacks, firmware security still sucks
Peripherals With Unsigned Firmware Expose Windows, Linux Computers to Attacks
Firmware Weaknesses Can Turn Computer Subsystems into Trojans
Hundreds of Millions of PC Components Still Have Hackable Firmware
Eclypsium Researchers Explore Perils of Insecure Peripheral Firmware in New Study
Unsigned firmware a bonanza for hackers
‘Millions’ of Dell, HP, and Lenovo PCs sitting ducks for firmware attacks
Is your firmware vulnerable to attack? A report says it might be
Daily Briefing – Eclypsium Report
Peripherals In Dell, HP, Lenovo PCs Leave Millions Vulnerable To Attack, Research Finds
‘Millions’ of Windows, Linux system open to attack due to risky firmware
Eclypsium Researchers Demonstrate Direct Memory Attacks
Enterprise Hardware Still Vulnerable to Memory Lane Attacks
Why direct-memory attacks on laptops just won’t go away
Devices Still Vulnerable to DMA Attacks Despite Protections
Enterprises ill-prepared for memory lane attacks despite defences
Dell, HP Memory-Access Bugs Open Attacker Path to Kernel Privileges
Total Eclypsium of the Laptop
Enterprise laptops vulnerable to critical direct memory access attack
Dell, HP security flaws leave laptops open to dangerous attacks
Firmware Vulnerabilities Creating an Expanded Attack Surface
Fight back against firmware attacks
Flood of New Advisories Expose Massive Gaps in Firmware Security
Intel Driver Vulnerability Can Give Attackers Deep Access to a Device
Intel Has Fixed Vulnerability That Allows for ‘Near-Omnipotent Control’ of Device
Researchers Describe Significant Flaw in Intel’s PMx Driver
Intel releases security updates to fix critical vulnerabilities in PMx driver
Intel releases updates to plug TPM-FAIL flaws, foil ZombieLoad v2 attacks
Researchers Describe Significant Flaw in Intel’s PMx Driver
Don’t miss this patch: Bad Intel drivers give hackers a backdoor to the Windows kernel
Researchers Disclose New Vulnerabilities in Windows Drivers
Intel Warns of Critical Info-Disclosure Bug in Security Engine
Flaw in Intel PMx driver gives ‘near-omnipotent control over a victim device’
100 of the world’s most promising start-ups to watch in 2019
The scariest hacks and vulnerabilities of 2019
How FISMA Requirements Relate to Firmware Security
Exploit found in Supermicro motherboards could allow for remote hijacking
Supermicro fixes BMC software flaws that expose servers to virtual USB attacks
Supermicro: New Critical Security Flaw Lets Hackers Take Over Corporate Servers, Exfiltrate Data
Over 47K Supermicro servers’ BMCs are prone to USBAnywhere, a remote virtual media vulnerability
At least 47,000 servers vulnerable to remote attack
Insecure virtual USB feature in Supermicro BMCs exposes servers to attack
BMC vulnerabilities in Supermicro servers allow remote takeover, data exfiltration attacks
USBAnywhere Bugs in Supermicro Servers Allow Remote USB Access
Enjoy the holiday weekend, America? Well-rested? Good. Supermicro server boards can be remotely hijacked
Supermicro Bug Could Let “Virtual USBs” Take Over Corporate Servers
Over 47K Supermicro Corporate Servers Vulnerable to Attack
Supermicro Vulnerability Gives “Virtually Omnipotent Control over a Server and its Contents”
Researchers found several flaws, such as weak encryption, in a popular series of servers.
Supermicro BMCs were susceptible to remote attacks, according to firmware security startup
USBAnywhere: BMC Flaws Expose Supermicro Servers to Remote Attacks
BMC Vulnerabilities Expose Supermicro Servers to Remote USB-Attacks
Researchers discover 40+ insecure drivers for Windows
What do Windows 10 and Uber or Lyft have in common? One bad driver can really ruin your day. And 40 can totally ruin your month
Screwed Drivers’ Report Finds Intel, AMD and Nvidia Vulnerabilities (Among Others)
Critical Windows 10 Warning: Millions Of Users At Risk
Researchers Find Over 40 Windows Security Flaws In Drivers From AMD, NVIDIA, Intel And Others
Vulnerabilities in Device Drivers From 20 Vendors Expose PCs to Persistent Malware
Windows 10 Security Alert: Vulnerabilities Found in Over 40 Drivers
Drivers from Over 40 Manufacturers Including Intel, NVIDIA, AMD Vulnerable to Privilege Escalation Malware Attacks
Driver Disaster: Over 40 Signed Drivers Can’t Pass Security Muster
Researchers find security flaws in 40 kernel drivers from 20 vendors
Intel, Sequretek, Eclypsium and Perception Point Advance Threat Detection Solutions
Firmware Vulnerabilities Show Supply Chain Risks
Vulnerable firmware in enterprise server supply chain
BMC firmware weaknesses put popular servers at risk
BMC Firmware Vulnerabilities Affect Lenovo, Gigabyte Servers
If malware wants to bury deep inside your Lenovo or Gigabyte servers, they can just ask Vertiv’s insecure BMC firmware
Firmware Bugs Plague Server Supply Chain, 7 Vendors Impacted
Gigabyte and Lenovo servers impacted by common BMC firmware flaws
This firmware flaw was bad enough, but then researchers looked at the supply chain
Security Flaws Found in Intel Software, Data Center SSDs
The importance of hardening firmware security
Windows 10 security: Bad bug in our CPU diagnostics app, so patch now, says Intel
Intel Patches High-Severity Flaw in Processor Diagnostic Tool
Why locking down ‘firmware’ has now become the next big cybersecurity challenge
Jolted by Meltdown and Spectre, Intel aims to accelerate patching process
How do I stop old USB drives from infecting my new Windows PC?
Business Briefs: Ubiquity Ventures Announces Its First Portfolio Companies
How Portland-area startups captured attention from 3 heavy-hitting investors
Eclypsium Platform 1.0 now available
Bare-Metal Cloud Firmware Security Fail Isn’t Limited to IBM – by Far
Bare-Metal Cloud Firmware Security Fail Isn’t Limited to IBM – by Far
How one Beaverton security company is fighting to protect firmware
Intel and Partner Ecosystem Offer New Silicon-Enabled Security Solutions
Hottest new cybersecurity products at RSA 2019
Supermicro hardware weaknesses let researchers backdoor an IBM cloud server
Security team discussed weakness in bare-metal services
Bare-metal cloud servers vulnerable to Cloudborne flaw
Morning Cybersecurity
After IBM SoftLayer fails to scrub bare-metal box firmware of any lurking spies, alarm raised over cloud server security
Supermicro hardware weaknesses let researchers backdoor an IBM cloud server
Hackers Can Slip Invisible Malware into ‘Bare Metal’ Cloud Computers
‘Cloudborne’: Bare-Metal Cloud Servers Vulnerable to Attack
‘Cloudborne’ IaaS Attack Allows Persistent Backdoors in the Cloud
Hackers Can Plant Backdoors on Bare Metal Cloud Servers: Researchers
Hackers Backdoor Cloud Servers to Attack Future Customers
Security automation on display in 2019 RSAC Innovation Sandbox
Innovation and Emerging Technology at the 2019 RSA Conference
Eclypsium demonstrates the remote bricking of a server
Watch researchers remotely brick a server by corrupting its BMC and UEFI firmware
How to Remotely Brick a Server
Fed IT security falls short
Servers Can Be Bricked Remotely via BMC Attack
How BMC and UEFI can be exploited to brick servers and take down your data center
Eclypsium raises $8.75M Series A round led by Madrona Venture Group to tackle hardware security
If Supermicro boards were so bug-ridden, why would hackers ever need implants?
Supermicro servers fixed after insecure firmware updating discovered
Supermicro wraps crypto-blanket around server firmware to hide it from malware injectors
Vulnerabilities found in the remote management interface of Supermicro servers
Intel Xeon workhorses boot evil maids out of the hotel: USB-based spying thwarted by fix
Evil Maid Attack Takes Your PC To The Cleaners With Sub-4 Minute Backdoor Firmware Install
Watch a Hacker Install a Firmware Backdoor on a Laptop in Less Than 5 Minutes
What got breached this week? Ticket portals, DNA sites, and Atlanta’s police cameras
Supermicro is the latest hardware vendor with a security issue
Firmware Vulnerabilities Disclosed in Supermicro Server Products
Spectre chip security vulnerability strikes again; patches incoming
Experts warn new ‘Superspectre’ bug uses the chip flaw to gain access to ‘all the secrets’ stored on a machine
Ex-Intel security expert: This new Spectre attack can even reveal firmware secrets
New Spectre Attack Recovers Data From a CPU’s Protected SMM Mode
Millions of Computers Are at Risk of Hacks That Crack Into Their Core
Intel Capital boosts startup investment, including Portland cybersecurity company
Former Intel security researchers launch firmware-targeted startup, land $2M

Press Releases

Eclypsium selected as the first company to help fortify the supply chain of hardware and firmware in government networks and systems

Company acknowledged for compliance, security health and technical excellence with SOC2 Type II certification and Global Infosec award win

New Fortune 500 customers, strategic partnerships and expansion in new global markets and industries propel company as supply chain attacks intensify.

Partnership aims to capture growing market opportunity around cybersecurity and help develop new revenue streams in Japan.

Eclypsium®, the enterprise firmware security company, today announced the appointment of Jarrod Bogue as Chief Revenue Officer and welcomed Arif Kareem to Eclypsium’s Board of Advisors.  

Eclypsium, the enterprise firmware security company, today announced the availability of Eclypsium for Network Devices, which allows organizations full visibility and control over their network device fleets, their networking infrastructure, and their device supply chains without installing agents on the devices themselves.

Leading enterprise firmware security company recognized as Baby Black Unicorn, having potential of being valued at $1b in near future

Eclypsium, the enterprise device integrity company, announced it has partnered with Securecraft PTE. Ltd, an authorized Singapore-based IT distributor.

Portland, OR – May 17, 2021 – Eclypsium® today announced a major new extension to their enterprise device integrity platform, which lets organizations easily extend visibility and security beyond their traditional endpoints to now include network and unmanaged devices that can impact overall security posture. These include traditional network gear like switches, routers, VPNs, application […]

Portland, OR – May 7, 2021 –Eclypsium®, the enterprise device security company, today announced it has been awarded a U.S. Air Force, AFWERX Small Business Innovation Research (SBIR) Phase 1 contract. The contract will allow Eclypsium to conduct feasibility studies with the Department of Defense (DoD) to demonstrate how the company’s enterprise device security platform supports unprecedented […]

Organizations Apply Risk-Based Vulnerability Management to Firmware and Hardware Infrastructure

Financing Accelerates Company Growth to Address Massive Device Security Gap

Eclypsium has been recognized as the Emerging Technology Company of the Year by the Technology Association or Oregon.

Eclypsium today announced its selection by TAG Cyber as a Distinguished Vendor in the 2021 Security Annual.

Eclypsium, an innovator in enterprise device security, has been recognized as one of four vendors in Gartner’s recent report Cool Vendors in Security Operations and Threat Intelligence.

Enterprise firmware security leader also receives Info Security PG’s Global Excellence Award and multiple Cybersecurity Excellence Awards

Enterprise Firmware Security Leader Recognized as One of The Most Promising Startups to Watch

Eclypsium Platform Now Generally Available; Joint Demos Available at RSA Conference

Eclypsium recognized for pioneering security that defends the firmware layer of the enterprise from vulnerabilities and threats

Madrona Venture Group, Andreessen Horowitz and Intel Capital Invest in Eclypsium’s Oversubscribed Series A Round.

News Blog

ZAG Communications for Eclypsium
Kari Walker
+1 (703) 928-9996