-

Binarly Transparency Platform 3.5 Introduces Java Ecosystem Support, Enterprise-Scale YARA Integration, Smarter Automation

SANTA MONICA, Calif.--(BUSINESS WIRE)--Binarly, a leading provider of software supply chain security solutions, today released the Binarly Transparency Platform 3.5 with Java ecosystem support, full enterprise-grade YARA integration, and operational upgrades designed to meet the speed and scale of modern product security workflows.

Binarly’s cryptographic algorithm identification engine now supports Java archives (JARs) and JVM bytecode, scanning both standalone and embedded files inside Docker containers or firmware.

Share

With this update, Binarly’s cryptographic algorithm identification engine now supports Java archives (JARs) and JVM bytecode, scanning both standalone and embedded files inside Docker containers or firmware. This means organizations can finally see what cryptographic primitives their Java-based products depend on, without needing access to source code.

Built on Code Property Graph (CPG) analysis, the new engine tracks dataflow across functions to eliminate false positives and maps every finding to NIST IR 8457 categories to help measure post-quantum cryptography (PQC) readiness. Support currently covers Bouncy Castle, Apache Commons, Google Tink, and Guava, with Android package analysis arriving later this year.

The platform refresh also features deep integration of YARA, the industry’s signature-based detection standard, across large-scale software and firmware portfolios.

Traditionally, maintaining YARA rules across teams and suppliers has been plagued by syntax drift, rule sprawl, and inconsistent enforcement. Binarly eliminates that friction with an interactive YARA Playground for rule development (YARA and our own FwHunt), a governed Rules Manager with granular role-based access controls, and a real-time Rust-based YARA-X engine that validates rules before deployment.

The result is a single governed pipeline where PSIRTs (Product Security Incident Response Teams), TPRM (Third Party Risk Management) teams, and procurement functions can drive consistent detections and evidence-based decisions across the enterprise.

“Java support and enterprise-scale YARA integration solve two of the hardest blind spots in modern product security. Most teams struggle to understand what’s really inside their Java stacks and to operationalize YARA rules consistently across complex environments. We’re the first to build the tooling to connect data from existing threat-intelligence feeds and this release connects both worlds, providing deep cryptographic visibility and scalable threat-hunting capabilities," said Alex Matrosov, CEO and Head of Research at Binarly.

The Binarly Transparency Platform 3.5 also adds:

  • Custom Rule Management: Security teams can define and deploy their own detection logic using YARA and FwHunt rules, the same internal schema Binarly uses for vulnerability and threat detections with more advanced code-driven rules. This bridges research and product security, allowing bespoke checks for vendor risk, hard-coded keys, or policy enforcement.

  • Organization Quotas: Simplifies license management with centralized allocation and visibility across distributed groups; Triage Enhancements to enable the addition of assignable statuses, threaded comments (with Markdown support), and dynamic charts; and backend upgrades that deliver faster performance, broader Android handling, and deeper extraction of cryptographic artifacts, from JARs to UEFI Secure Boot keys.

From firmware to JVM bytecode, the Binarly Transparency Platform 3.5 is built by security research experts to give defenders a unified view of vulnerabilities, cryptographic posture, and reachability across complex software ecosystems.

For procurement and third-party vendor risk teams, Binarly delivers measurable improvements in vendor assessment workflows by enabling private threat-intelligence ingestion, scoped rule enforcement, and transparent, evidence-backed risk reporting. Security teams benefit from faster rule validation, consistent detections, and streamlined triage, all while lowering the hidden operational costs that typically burden large-scale YARA programs.

About Binarly:

Binarly is a U.S.‑based software and firmware supply‑chain security company founded in 2021. The Binarly Transparency Platform helps device manufacturers, OEMs and enterprise security teams detect vulnerabilities, misconfigurations, secrets and malicious code in firmware and software components.

Contacts

Binarly


Release Versions

Contacts

Social Media Profiles
More News From Binarly

Binarly Names Rick Congdon Independent Board Member and Strategic Advisor; Appoints AppSec Leader Chris Eng as Strategic Advisor

SANTA MONICA, Calif.--(BUSINESS WIRE)--Binarly, the industry leader in software and firmware supply‑chain security, today announced Rick Congdon has joined the company as an Independent Board Member and Strategic Advisor. Congdon will provide expert guidance to steer Binarly’s global go-to-market and enterprise sales strategy. The company also appointed software security veteran Chris Eng as a Strategic Advisor focused on product vision and long-range roadmap. Congdon, a proven growth leader wh...

Binarly Partners with QuSecure to Accelerate Enterprise Post‑Quantum Readiness

SANTA MONICA, Calif.--(BUSINESS WIRE)--Binarly, the industry leader in software and firmware supply‑chain security, is announcing a strategic technology alliance with QuSecure, a provider of post‑quantum cryptography (PQC) and crypto‑agility solutions, to deliver the most comprehensive solution available for enterprises facing quantum-safe compliance deadlines. The integration combines Binarly’s deep‑binary cryptographic analysis with QuSecure’s QuProtect platform, giving defenders a single pan...

Binarly Patents New Method for Reachability Analysis for Binary Executables

SANTA MONICA, Calif.--(BUSINESS WIRE)--Binarly, a leading firmware and software supply chain security company, has been awarded U.S. Patent No. 12,287,885 for its invention of a new method for computing context-sensitive reachability analysis metrics across binary executables. The patented invention empowers security teams to determine not only whether a vulnerability exists, but how easily it could be exploited in a given real-world environment. Read the full patent (PDF). The reachability ana...
Back to Newsroom