Software supply chain security vendor claims to have discovered that true, non-agent-based runtime vulnerability analysis is possible by harnessing cloud APIs. Credit: Roman Samborskyi / Shutterstock Software supply chain security vendor Rezilion has announced the release of a new agentless solution for vulnerability management. It enables security teams to monitor exploitable software attack surfaces in runtime without using an agent, reducing the time and overhead required for traditional runtime-based software vulnerability analysis, according to the firm. Rezilion’s new solution covers all versions of Windows and Linux across 12 code languages, it said.Effective prioritization and remediation of software vulnerabilities can be a significant challenge for organizations, with attackers increasingly targeting software supply chains to exploit weaknesses. The State of Vulnerability Management in DevSecOps report revealed that organizations are losing thousands of hours in time and productivity dealing with backlogs of vulnerabilities that they have neither the time or resources to tackle effectively. More than half of 634 IT and IT security practitioners said their backlog consists of more than 100,000 vulnerabilities and the average number of vulnerabilities in backlogs overall is 1.1 million, according to the data.Meanwhile, the 2023 Unit 42 Network Threat Trends Research Report revealed a 55% increase in the exploitation of vulnerabilities in 2022 compared to 2021. Recently, a software vulnerability in MOVEit Transfer, a managed file transfer service, caused shockwaves after it was widely exploited by hackers to target organizations across the globe.Non-agent-based runtime analysis possible by harnessing cloud APIsAlthough the software vulnerability risks and management challenges companies face are significant, many vulnerabilities are not actually exploitable in runtime, Rezilion said in a press release. Vulnerability prioritization using runtime data can reveal which vulnerabilities are exploitable depending on a user’s unique environment, helping to reduce vulnerability management “noise” by detecting which specific components need patching, and which don’t. However, an agent has always been needed to get this visibility into the runtime, which can represent operational risks and overheads, according to Rezilion. Its introduction of an agentless solution that can see into the runtime execution of software and determine which components are vulnerable/exploitable in the runtime context – which the vendor claims is a first – allows customers to ensure software security in production and continuous integration from the convenience of a single platform without interfering with product performance, additional code, or agent execution, Rezilion said.It took Rezilion years of research to discover that true, non-agent-based runtime analysis is possible by using cloud APIs’ indirect access to instances to reconstruct the execution of code along the lifecycle of hosts and containers, said Shlomi Boutnaru, co-founder and CTO at Rezilion. “This means we can now look at a snapshot of a host or a container and use proprietary forensic methods to reverse-engineer from it the entire code loading and execution history – without actually needing to be there with an agent as it happened.” Related content news Amazon debuts biometric security device, updates Detective and GuardDuty Amazon’s latest security offerings, announced at its re:Invent conference, cover everything from advanced biometrics to new tools for defeating runtime and cloud threats, including identity and access management (IAM) capabilities. By Jon Gold Nov 29, 2023 3 mins Biometrics Security Monitoring Software Threat and Vulnerability Management news Almost all developers are using AI despite security concerns, survey suggests About 96% of developers are using AI tools and nearly eight out of 10 coders are bypassing security policies to use them, while placing unfounded trust into AI’s competence and security, according to the report by Snyk. By John Mello Jr. Nov 29, 2023 4 mins Development Tools Security Practices Supply Chain news FBI probes Pennsylvanian water utility hack by pro-Iran group Federal and state investigations are underway for the recent pro-Iran hack into a Pennsylvania-based water utility targeting Israel-made equipment. By Shweta Sharma Nov 29, 2023 4 mins Cyberattacks Utilities Industry feature 3 ways to fix old, unsafe code that lingers from open-source and legacy programs Code vulnerability is not only a risk of open-source code, with many legacy systems still in use — whether out of necessity or lack of visibility — the truth is that cybersecurity teams will inevitably need to address the problem. By Maria Korolov Nov 29, 2023 9 mins Security Practices Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe