Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Exiger Acquires aDolus for Enhanced Security

July 30, 2024
Reading Time: 2 mins read
in News
Exiger Acquires aDolus for Enhanced Security

Exiger has announced the acquisition of aDolus Technology Inc., a move aimed at enhancing its software supply chain visibility and risk management capabilities. This acquisition allows Exiger to integrate aDolus’ technology, which can generate software bills of material (SBOMs) and analyze software binaries for provenance. With rising incidents of supply chain attacks since high-profile breaches like SolarWinds and Log4j, this integration is crucial for improving security measures across various sectors, including law enforcement and government.

The acquisition addresses a significant blind spot in cybersecurity, particularly concerning vulnerabilities in operational and legacy technologies. Exiger President Carrie Wibben emphasized that the costs associated with maintaining outdated systems exceed $1 trillion, highlighting the urgency of improving visibility and risk assessment in software supply chains. The combined capabilities of Exiger and aDolus enable clients to verify supplier claims about software composition and security, thus enhancing overall trust in third-party vendors.

aDolus, known for its expertise in operational technology and real-time operating systems, brings valuable insights and analytics to the partnership. Its FACT platform provides high-precision risk analytics, generates retroactive SBOMs for legacy systems, and validates current supplier SBOMs. By harnessing aDolus’ capabilities, Exiger aims to uncover hidden third-party risks and enhance the provenance of software components, even when they have been rebranded or misattributed.

This acquisition not only strengthens Exiger’s offerings in cybersecurity but also empowers clients in critical industries such as energy, telecom, and healthcare to achieve greater supply chain visibility. The integration of aDolus enhances Exiger’s Ion Channel platform, enabling customers to “trust but verify” the security of their software supply chains. As cyber threats continue to evolve, this strategic partnership positions Exiger as a leader in safeguarding organizations against future supply chain attacks.

Reference:

  • Exiger Enhances Supply Chain Security with aDolus Acquisition
Tags: acquisitionsaDolus TechnologyCyber NewsCyber News 2024Cyber threatsExigerJuly 2024supply chain
ADVERTISEMENT

Related Posts

FBI Warns Of Virtual Kidnapping Scams

EU Fines X 140 Million Over Blue Check

December 8, 2025
FBI Warns Of Virtual Kidnapping Scams

Portugal Revises Cybercrime Law For Researchers

December 8, 2025
FBI Warns Of Virtual Kidnapping Scams

FBI Warns Of Virtual Kidnapping Scams

December 8, 2025
Niobium Raises 23 Million For FHE Tech

NCSC Warns Orgs Of Exposed Device Flaws

December 5, 2025
PRC Hackers Use BrickStorm In US

PRC Hackers Use BrickStorm In US

December 5, 2025
NCSC Warns Orgs Of Exposed Device Flaws

Hackers Accused Of Wiping 96 Databases

December 5, 2025

Latest Alerts

Sneeit RCE And ICTBroadcast Bug Power Attacks

MuddyWater Uses UDPGangster In Campaign

Android Malware Adds Stronger Data Theft

Silver Fox Spreads ValleyRAT In China

Intellexa Leak Exposes Predator Zero Days

Hackers Exploit ArrayOS AG VPN Flaw

Subscribe to our newsletter

    Latest Incidents

    Honduran Vote System Faces Security Breach

    Petco Confirms Data Exposure Incident

    Hackers Hit Major Russian Logistics Firm

    ASUS Confirms Vendor Breach By Everest

    Marquis Breach Hits Over 780,000 People

    Leroy Merlin Reports Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial