#software-vulnerabilities

[ follow ]
#cybersecurity
Business intelligence
fromInfoWorld
12 hours ago

Apiiro launches AI-powered risk analysis map for software

Apiiro's Software Graph Visualization offers real-time insights into software architecture, vulnerabilities, and risk through interactive AI-powered maps.
fromITPro
5 months ago
Information security

Want developers to build secure software? You need to ditch these two programming languages

Programming languages like C and C++ are vulnerable to memory safety issues, increasing security risks for developers and organizations.
fromSecuritymagazine
8 months ago
Information security

36% of global internet traffic originated from bots

Cyberattacks are increasingly targeting multiple customers, with 91% of attacks employing mass scanning to exploit vulnerabilities.
fromTechCrunch
2 months ago
Information security

A brief history of mass-hacks | TechCrunch

Enterprise cybersecurity tools, while essential, often contain vulnerabilities that can be exploited by hackers.
fromTheregister
5 months ago
Information security

Google's AI bug hunters sniff out two dozen-plus code flaws

Google's OSS-Fuzz enhances software security by identifying vulnerabilities with AI-driven techniques, notably finding flaws that human testers often miss.
Business intelligence
fromInfoWorld
12 hours ago

Apiiro launches AI-powered risk analysis map for software

Apiiro's Software Graph Visualization offers real-time insights into software architecture, vulnerabilities, and risk through interactive AI-powered maps.
fromITPro
5 months ago
Information security

Want developers to build secure software? You need to ditch these two programming languages

Programming languages like C and C++ are vulnerable to memory safety issues, increasing security risks for developers and organizations.
fromSecuritymagazine
8 months ago
Information security

36% of global internet traffic originated from bots

Cyberattacks are increasingly targeting multiple customers, with 91% of attacks employing mass scanning to exploit vulnerabilities.
fromTechCrunch
2 months ago
Information security

A brief history of mass-hacks | TechCrunch

Enterprise cybersecurity tools, while essential, often contain vulnerabilities that can be exploited by hackers.
fromTheregister
5 months ago
Information security

Google's AI bug hunters sniff out two dozen-plus code flaws

Google's OSS-Fuzz enhances software security by identifying vulnerabilities with AI-driven techniques, notably finding flaws that human testers often miss.
more#cybersecurity
fromTheregister
2 days ago
Online Community Development

4chan back from 'catastrophic' attack with tale of cash woes

4chan suffered catastrophic data loss due to a cyberattack exploiting outdated software, highlighting chronic funding issues affecting its maintenance.
Scala
fromTheregister
2 months ago

Time to make C the COBOL of this century

Buffer overflow vulnerabilities in software are deemed avoidable and frustrating by authorities, prompting calls for better coding practices and alternatives to C.
fromNist
3 months ago
Information security

NVD

End-of-Life versions of Node.js are unsupported and expose systems to security vulnerabilities.
Users should upgrade to currently supported Node.js versions to mitigate risks.
fromTheregister
3 months ago
Software development

Boffins carve up C so code can be converted to Rust

A method to convert C code to Rust has been developed to enhance memory safety in software.
Information security
fromwww.dw.com
9 months ago

US, allies say North Korean hackers steal military secrets DW 07/25/2024

North Korean hackers, known as Anadriel, target defense and engineering companies globally for classified military secrets to support Pyongyang's nuclear program.
[ Load more ]