Founded Year

2021

Stage

Seed VC | Alive

Total Raised

$14.1M

Last Raised

$10.5M | 1 yr ago

Mosaic Score
The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.

+13 points in the past 30 days

About Binarly

Binarly specializes in firmware security and supply chain risk management within the cybersecurity industry. The company offers an AI-powered platform that detects and remediates known and unknown vulnerabilities in firmware and software supply chains. Binarly's services are designed to provide visibility into firmware and software vulnerabilities, identify malicious code, and offer prescriptive fixes for rapid resolution. It was founded in 2021 and is based in Santa Monica, California.

Headquarters Location

2450 Colorado Avenue Suite 100E

Santa Monica, California, 90404,

United States

Loading...

Loading...

Research containing Binarly

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned Binarly in 2 CB Insights research briefs, most recently on May 16, 2025.

Expert Collections containing Binarly

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Binarly is included in 5 Expert Collections, including Cybersecurity.

C

Cybersecurity

10,758 items

These companies protect organizations from digital threats.

A

AI 100 (2024)

100 items

A

Artificial Intelligence

10,047 items

A

AI 100 (2025)

100 items

A

AI 100 (All Winners 2018-2025)

200 items

Binarly Patents

Binarly has filed 3 patents.

The 3 most popular patent topics include:

  • wireless networking
  • compiler construction
  • cryptography
patents chart

Application Date

Grant Date

Title

Related Topics

Status

10/2/2024

2/25/2025

Wireless networking, Memory management, Parallel computing, DEC hardware, Minicomputers

Grant

Application Date

10/2/2024

Grant Date

2/25/2025

Title

Related Topics

Wireless networking, Memory management, Parallel computing, DEC hardware, Minicomputers

Status

Grant

Latest Binarly News

Updates urged after disclosure of Windows Secure Boot vulnerability

Jun 12, 2025

June 12, 2025 (Adobe Stock) The June edition of Microsoft’s Patch Tuesday release became even more of a priority for administrators thanks to the disclosure of a potential rootkit vulnerability on the Windows Secure Boot system. Researchers with security vendor Binarly said that the vulnerability they discovered and securely reported to Microsoft would potentially allow an attacker to bypass the UEFI checks that prevent the use of unauthorized firmware on Windows systems. Designated CVE-2025-3052 , the flaw is based on a memory corruption error in the UEFI certificate Microsoft uses to validate an operating system build before it can be loaded. The flaw was among those addressed earlier this week in the Patch Tuesday update . “Attackers can exploit this vulnerability to run unsigned code during the boot process, effectively bypassing Secure Boot and compromising the system’s chain of trust,” the Binarly research team explained in their disclosure . “Because the attacker’s code executes before the operating system even loads, it opens the door for attackers to install bootkits and undermine OS-level security defenses." The researchers found that a non-malicious BIOS flashing tool that has been circulating since at least 2024, and possibly 2022, was able to execute under the Microsoft Corporation UEFI CA 2011" certificate. A deeper dig into the tool found that it was taking advantage of a memory buffer error, the attacker can write code to change the value of a key variable that allows for secure boot to be disabled. The result is the ability for the attacker to bypass authentication and potentially run malware within a rootkit. By running as such a low level on the system, attackers can not only evade detection by security tools, but can also maintain persistence after updates and reinstalls. If there is one saving grace in all of this, it is that the vulnerability cannot be remotely targeted without authentication. In order to be able to write code to the vulnerable portions of memory the attacker needs to have system level access, meaning they would have to have already compromised the target machine via other methods. In disclosing the flaw, the Binarly team also noted that such rootkit flaws are becoming an increasingly common occurrence. “Secure Boot bypasses continue to be a persistent issue within the UEFI ecosystem, with new vulnerabilities surfacing a few times each year,” the researchers noted. The disclosure also underscores the need for administrators and PC owners to not just brush aside Microsoft’s update reminders. It is always recommended that the monthly updates be tested and deployed as soon as possible, even more so with the June updates. Security professionals will often refer to the day after Patch Tuesday as “Exploit Wednesday” because the disclosure of vulnerability details makes the process of writing new exploits and malware installation scripts all but trivial for threat actors.

Binarly Frequently Asked Questions (FAQ)

  • When was Binarly founded?

    Binarly was founded in 2021.

  • Where is Binarly's headquarters?

    Binarly's headquarters is located at 2450 Colorado Avenue, Santa Monica.

  • What is Binarly's latest funding round?

    Binarly's latest funding round is Seed VC.

  • How much did Binarly raise?

    Binarly raised a total of $14.1M.

  • Who are the investors of Binarly?

    Investors of Binarly include Acrobator Ventures, WestWave Capital, Cisco Investments, Liquid 2 Ventures, Canaan Partners and 15 more.

  • Who are Binarly's competitors?

    Competitors of Binarly include SixMap, Chainguard, Prewave, ReversingLabs, SpyCloud and 7 more.

Loading...

Compare Binarly to Competitors

Aqua Security Logo
Aqua Security

Aqua Security specializes in cloud-native security. The company offers a comprehensive cloud-native application protection platform that provides prevention, detection, and response automation across the entire application lifecycle, securing the build, cloud infrastructure, and running workloads. It primarily serves sectors such as finance and the federal government. Aqua Security was formerly known as Scalock. It was founded in 2015 and is based in Burlington, Massachusetts.

Flashpoint Logo
Flashpoint

Flashpoint is a data and intelligence company that specializes in cybersecurity and risk management. The company offers a range of services, including cyber threat intelligence, vulnerability management, physical security intelligence, national security intelligence, professional services like threat response and readiness, and extortion monitoring. It primarily serves sectors such as financial services, retail, healthcare, technology, and public sector and national security. It was founded in 2010 and is based in New York, New York.

Veracode Logo
Veracode

Veracode provides application security solutions across sectors, including government, financial services, software, technology, retail, and healthcare. The company offers services for the software development life cycle, including vulnerability detection, static and dynamic application security testing, software composition analysis, container security, application security posture management, and penetration testing. Veracode's platform integrates into development processes, providing feedback and remediation supported by artificial intelligence to improve developer efficiency and security. It was founded in 2006 and is based in Burlington, Massachusetts.

O
Oligo

Oligo focuses on runtime application security and offers solutions for scanning and monitoring, supply chain security, application vulnerability management, and attack detection and response. It was founded in 2022 and is based in Tel Aviv, Israel.

Appdome Logo
Appdome

Appdome operates within the cybersecurity industry and offers a platform that includes security, fraud prevention, malware protection, bot protection, and geo-compliance features for Android and iOS apps, integrated into the CI/CD pipeline. It was founded in 2012 and is based in Redwood City, California.

ThreatConnect Logo
ThreatConnect

ThreatConnect operates in cyber threat intelligence operations and cyber risk quantification within the cybersecurity industry. The company provides a platform that integrates threat intelligence data and automates processes for cybersecurity defense. ThreatConnect's solutions allow collaboration among threat intelligence, security operations, and cyber risk management teams. It was founded in 2014 and is based in Arlington, Virginia.

Loading...

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.