#software-vulnerabilities

[ follow ]
#cybersecurity

Australia and Google turn to AI to protect critical infrastructure

Australia is partnering with Google to enhance the cybersecurity of critical national infrastructure through automated flaw detection in software supply chains.

Want developers to build secure software? You need to ditch these two programming languages

Programming languages like C and C++ are vulnerable to memory safety issues, increasing security risks for developers and organizations.

36% of global internet traffic originated from bots

Cyberattacks are increasingly targeting multiple customers, with 91% of attacks employing mass scanning to exploit vulnerabilities.

Google's AI bug hunters sniff out two dozen-plus code flaws

Google's OSS-Fuzz enhances software security by identifying vulnerabilities with AI-driven techniques, notably finding flaws that human testers often miss.

Zero Day Initiative - Multiple Vulnerabilities in the Mazda In-Vehicle Infotainment (IVI) System

Mazda Connect CMU system has critical vulnerabilities allowing root access through physical USB connections.
Problems arise from poor input sanitization, enabling malicious exploitation.

Most Critical Open Source Projects Lack Memory-Safe Code, CISA Says - DevOps.com

Top cybersecurity agency urges developers to adopt memory-safe programming languages to reduce vulnerabilities.

Australia and Google turn to AI to protect critical infrastructure

Australia is partnering with Google to enhance the cybersecurity of critical national infrastructure through automated flaw detection in software supply chains.

Want developers to build secure software? You need to ditch these two programming languages

Programming languages like C and C++ are vulnerable to memory safety issues, increasing security risks for developers and organizations.

36% of global internet traffic originated from bots

Cyberattacks are increasingly targeting multiple customers, with 91% of attacks employing mass scanning to exploit vulnerabilities.

Google's AI bug hunters sniff out two dozen-plus code flaws

Google's OSS-Fuzz enhances software security by identifying vulnerabilities with AI-driven techniques, notably finding flaws that human testers often miss.

Zero Day Initiative - Multiple Vulnerabilities in the Mazda In-Vehicle Infotainment (IVI) System

Mazda Connect CMU system has critical vulnerabilities allowing root access through physical USB connections.
Problems arise from poor input sanitization, enabling malicious exploitation.

Most Critical Open Source Projects Lack Memory-Safe Code, CISA Says - DevOps.com

Top cybersecurity agency urges developers to adopt memory-safe programming languages to reduce vulnerabilities.
morecybersecurity

Secure software development education report from the Linux Foundation | App Developer Magazine

Urgent need for formalized industry education and training programs in secure software development.

Microsoft Crashes it's service! Why We Need an Open Source Future

Microsoft outage caused by third-party update resulted in global disruptions

US, allies say North Korean hackers steal military secrets DW 07/25/2024

North Korean hackers, known as Anadriel, target defense and engineering companies globally for classified military secrets to support Pyongyang's nuclear program.
#open-source-software

The internet is built on unpaid labour take it away, and the whole thing crumbles

Open source software relies heavily on the unpaid labor of hobbyists.
Small projects can have a significant impact on modern digital infrastructure.

Open source is not insecure

Open source software relies on trust in authors and contributors.
Security of open source improves with source code transparency.

The internet is built on unpaid labour take it away, and the whole thing crumbles

Open source software relies heavily on the unpaid labor of hobbyists.
Small projects can have a significant impact on modern digital infrastructure.

Open source is not insecure

Open source software relies on trust in authors and contributors.
Security of open source improves with source code transparency.
moreopen-source-software

White House recommends use of memory-safe languages like Python

Memory-safe programming languages recommended by White House report
Python's role in memory-safety highlighted by Python Software Foundation and Cryptography library's migration to Rust.

Optus breach is a wake-up call for secure coding practices

Coding error in Optus Mobile systems led to a major data breach affecting over nine million customers, emphasizing the critical importance of secure coding practices.
[ Load more ]