{"id":6858,"date":"2025-02-14T12:20:17","date_gmt":"2025-02-14T20:20:17","guid":{"rendered":"https:\/\/objectsecurity.com\/?p=6858"},"modified":"2025-02-18T14:44:53","modified_gmt":"2025-02-18T22:44:53","slug":"binlens_3-1_release","status":"publish","type":"post","link":"https:\/\/objectsecurity.com\/binlens_3-1_release\/","title":{"rendered":"PRESS RELEASE: ObjectSecurity Releases BinLens 3.1 for Advanced Binary Vulnerability Analysis"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_3_4 3_4 fusion-flex-column\" style=\"--awb-padding-bottom:0px;--awb-bg-size:cover;--awb-width-large:75%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.56%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.56%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><strong>San Diego, CA \u2014 February 14, 2025<\/strong>\u00a0\u2014 ObjectSecurity, a recognized leader in advanced defense and industrial cybersecurity solutions, today announced the release of<strong> BinLens\u2122 3.1<\/strong>, the latest iteration of its cutting-edge binary vulnerability analysis tool.<\/p>\n<p><strong>BinLens\u2122<\/strong> addresses critical gaps in traditional cybersecurity approaches by automating the complex process of analyzing binary programs. This powerful new version provides organizations with deeper insights into vulnerabilities, enabling faster and more effective mitigation of potential threats.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_4 1_4 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:250px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"300\" height=\"172\" title=\"binlens-trnsp\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=300%2C172&#038;ssl=1\" alt class=\"img-responsive wp-image-6649\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=66%2C38&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=177%2C102&amp;ssl=1 177w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=200%2C115&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=300%2C172&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=320%2C184&amp;ssl=1 320w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=400%2C230&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=460%2C264&amp;ssl=1 460w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=500%2C287&amp;ssl=1 500w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=540%2C310&amp;ssl=1 540w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=600%2C344&amp;ssl=1 600w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=669%2C384&amp;ssl=1 669w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=700%2C402&amp;ssl=1 700w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=768%2C441&amp;ssl=1 768w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=800%2C459&amp;ssl=1 800w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=940%2C539&amp;ssl=1 940w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=1024%2C588&amp;ssl=1 1024w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=1200%2C689&amp;ssl=1 1200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?resize=1536%2C881&amp;ssl=1 1536w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/binlens-trnsp.png?fit=1999%2C1147&amp;ssl=1 1999w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:0px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><p>Engineered to effortlessly uncover zero-day vulnerabilities with cutting-edge accuracy and minimal false positives, <strong>BinLens\u2122<\/strong> is designed for both IT and OT\/ICS environments.<\/p>\n<p>Leveraging advanced automation, <strong>BinLens\u2122<\/strong> streamlines traditionally labor-intensive tasks such as symbolic analysis, static analysis, disassembly, and decompilation. Unlike conventional tools that focus solely on known vulnerabilities, <strong>BinLens\u2122<\/strong> offers a proactive defense, providing organizations with unmatched flexibility through its versatile deployment options.<\/p>\n<p>Conventional cybersecurity methods\u2014such as network scans, SBOMs, and source code reviews\u2014often fall short, detecting only known vulnerabilities and leaving critical gaps. <strong>BinLens\u2122<\/strong> takes a groundbreaking approach, leveraging advanced symbolic binary-level analysis to detect hidden and unpublished vulnerabilities, including memory-safety violations and other undefined behaviors. Its superior detection accuracy and dramatically lower false-positive rate set it apart from traditional tools.<\/p>\n<p><strong>Key<\/strong><strong> New Features of BinLens\u2122 Include:<\/strong><\/p>\n<ul>\n<li><span><strong>DoubleFree SymbEx analysis:<\/strong>\u00a0Detects instances of CWE-415: Double Free.<\/span><\/li>\n<li><span><strong>NullPointerDereference SymbEx analysis:<\/strong>\u00a0Detects instances of CWE-476: NULL Pointer Dereference.<\/span><\/li>\n<li><span><strong>OutOfBoundsRead SymbEx analysis:<\/strong>\u00a0Detects instances of CWE-125: Out-of-bounds Read.<\/span><\/li>\n<li><span><strong>OutOfBoundsWrite SymbEx analysis:<\/strong>\u00a0Detects instances of CWE-787: Out-of-bounds Write.<\/span><\/li>\n<\/ul>\n<p><strong>Serving<\/strong><strong> a Broad Range of Users:<\/strong><\/p>\n<ul>\n<li><strong>Red Teams, Reverse Engineers, Threat Hunters, and Vulnerability Researchers:<\/strong> Accelerate workflows and gain deeper insights.<\/li>\n<li><strong>DevSecOps Engineers, QA Testers, and Developers:<\/strong> Detect vulnerabilities missed by source code analysis and integrate findings into DevSecOps pipelines.<\/li>\n<li><strong>Operators, Procurement Teams:<\/strong> Mitigate supply chain risks by analyzing software during procurement, deployment, and patching, including legacy devices.<\/li>\n<\/ul>\n<p><strong>Availability<\/strong><\/p>\n<p><strong>BinLens\u2122 3.1<\/strong> is officially available starting today, February 14, 2025. Organizations can obtain the latest version directly from ObjectSecurity or through our network of authorized partners. For more information on licensing options or to schedule a demo, please visit <a href=\"https:\/\/objectsecurity.com\/binlens\">ObjectSecurity BinLens<\/a>.<\/p>\n<p><strong>About ObjectSecurity<\/strong><br \/>\nObjectSecurity LLC is a trusted leader in solving complex, evolving cybersecurity and supply chain risk challenges that threaten national security and critical operations. Specializing in advanced cybersecurity solutions for both IT and OT\/ICS systems, ObjectSecurity focuses on automating and streamlining security processes. With innovative tools like <strong>BinLens\u2122<\/strong>, the company empowers organizations to proactively identify and mitigate vulnerabilities at their core\u2014within software code and data.<\/p>\n<p>ObjectSecurity\u2019s holistic, proactive approach is designed to prevent cyberattacks and minimize production downtime across critical industries, including military defense, municipal smart cities, public and private transportation, energy, wastewater treatment, power utilities, manufacturing, and life sciences.<\/p>\n<p>With over two decades of experience, ObjectSecurity has been a trusted provider of cybersecurity and supply chain risk management solutions to U.S. defense and federal agencies. Today, these cutting-edge technologies are commercially available to government and private sector organizations.<\/p>\n<p>Headquartered in San Diego, CA, ObjectSecurity is a privately held company with a global presence.<\/p>\n<p><strong>For more information, visit<\/strong><\/p>\n<p><strong>BinLens\u2122<\/strong> https:\/\/www.objectsecurity.com\/binlens<\/p>\n<p>ObjectSecurity https:\/\/www.objectsecurity.com<\/p>\n<p><strong>Media Contact:<\/strong><\/p>\n<ul>\n<li>Dan Mathews<\/li>\n<li>1 650 515 3391<\/li>\n<li>Contact https:\/\/objectsecurity.com\/contact<\/li>\n<\/ul>\n<ul><\/ul>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:60px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/binlens\"><span class=\"fusion-button-text\">ObjectSecurity BinLens<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:60px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/contact-us\/?reference=Tell%20me%20more%20about%20BinLens%203.0\"><span class=\"fusion-button-text\">Contact us to learn more<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":6859,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[63,69,89,39,58,34,87],"tags":[],"class_list":["post-6858","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-binlens","category-company-news","category-landingpage","category-ot-ics-cybersecurity","category-press-release","category-reverse-engineering","category-tech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PRESS RELEASE: ObjectSecurity Releases BinLens 3.1 for Advanced Binary Vulnerability Analysis - ObjectSecurity<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/binlens_3-1_release\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/binlens_3-1_release\\\/\"},\"author\":{\"name\":\"Dan Mathews\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"headline\":\"PRESS RELEASE: ObjectSecurity Releases BinLens 3.1 for Advanced Binary Vulnerability Analysis\",\"datePublished\":\"2025-02-14T20:20:17+00:00\",\"dateModified\":\"2025-02-18T22:44:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/binlens_3-1_release\\\/\"},\"wordCount\":4977,\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/binlens_3-1_release\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/new-release.png?fit=600%2C337&ssl=1\",\"articleSection\":[\"BinLens\",\"Company News\",\"Landing Page\",\"OT\\\/ICS Cybersecurity\",\"Press Release\",\"Reverse Engineering\",\"Technical\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/binlens_3-1_release\\\/\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/binlens_3-1_release\\\/\",\"name\":\"PRESS RELEASE: ObjectSecurity Releases BinLens 3.1 for Advanced Binary Vulnerability Analysis - ObjectSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/binlens_3-1_release\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/binlens_3-1_release\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/new-release.png?fit=600%2C337&ssl=1\",\"datePublished\":\"2025-02-14T20:20:17+00:00\",\"dateModified\":\"2025-02-18T22:44:53+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/binlens_3-1_release\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/objectsecurity.com\\\/binlens_3-1_release\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/binlens_3-1_release\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/new-release.png?fit=600%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/new-release.png?fit=600%2C337&ssl=1\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/binlens_3-1_release\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/objectsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PRESS RELEASE: ObjectSecurity Releases BinLens 3.1 for Advanced Binary Vulnerability Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/\",\"name\":\"ObjectSecurity\",\"description\":\"OT\\\/ICS Asset Binary Vulnerability Analysis and Reporting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/objectsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\",\"name\":\"Dan Mathews\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"caption\":\"Dan Mathews\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PRESS RELEASE: ObjectSecurity Releases BinLens 3.1 for Advanced Binary Vulnerability Analysis - ObjectSecurity","robots":{"index":"noindex","follow":"follow"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/objectsecurity.com\/binlens_3-1_release\/#article","isPartOf":{"@id":"https:\/\/objectsecurity.com\/binlens_3-1_release\/"},"author":{"name":"Dan Mathews","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"headline":"PRESS RELEASE: ObjectSecurity Releases BinLens 3.1 for Advanced Binary Vulnerability Analysis","datePublished":"2025-02-14T20:20:17+00:00","dateModified":"2025-02-18T22:44:53+00:00","mainEntityOfPage":{"@id":"https:\/\/objectsecurity.com\/binlens_3-1_release\/"},"wordCount":4977,"image":{"@id":"https:\/\/objectsecurity.com\/binlens_3-1_release\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/new-release.png?fit=600%2C337&ssl=1","articleSection":["BinLens","Company News","Landing Page","OT\/ICS Cybersecurity","Press Release","Reverse Engineering","Technical"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/objectsecurity.com\/binlens_3-1_release\/","url":"https:\/\/objectsecurity.com\/binlens_3-1_release\/","name":"PRESS RELEASE: ObjectSecurity Releases BinLens 3.1 for Advanced Binary Vulnerability Analysis - ObjectSecurity","isPartOf":{"@id":"https:\/\/objectsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/objectsecurity.com\/binlens_3-1_release\/#primaryimage"},"image":{"@id":"https:\/\/objectsecurity.com\/binlens_3-1_release\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/new-release.png?fit=600%2C337&ssl=1","datePublished":"2025-02-14T20:20:17+00:00","dateModified":"2025-02-18T22:44:53+00:00","author":{"@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"breadcrumb":{"@id":"https:\/\/objectsecurity.com\/binlens_3-1_release\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/objectsecurity.com\/binlens_3-1_release\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/objectsecurity.com\/binlens_3-1_release\/#primaryimage","url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/new-release.png?fit=600%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/new-release.png?fit=600%2C337&ssl=1","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/objectsecurity.com\/binlens_3-1_release\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/objectsecurity.com\/"},{"@type":"ListItem","position":2,"name":"PRESS RELEASE: ObjectSecurity Releases BinLens 3.1 for Advanced Binary Vulnerability Analysis"}]},{"@type":"WebSite","@id":"https:\/\/objectsecurity.com\/#website","url":"https:\/\/objectsecurity.com\/","name":"ObjectSecurity","description":"OT\/ICS Asset Binary Vulnerability Analysis and Reporting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/objectsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d","name":"Dan Mathews","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","caption":"Dan Mathews"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/new-release.png?fit=600%2C337&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/6858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/comments?post=6858"}],"version-history":[{"count":1,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/6858\/revisions"}],"predecessor-version":[{"id":6860,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/6858\/revisions\/6860"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media\/6859"}],"wp:attachment":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media?parent=6858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/categories?post=6858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/tags?post=6858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}