#software-vulnerabilities

[ follow ]
#cybersecurity

Australia and Google turn to AI to protect critical infrastructure

Australia is partnering with Google to enhance the cybersecurity of critical national infrastructure through automated flaw detection in software supply chains.

Want developers to build secure software? You need to ditch these two programming languages

Programming languages like C and C++ are vulnerable to memory safety issues, increasing security risks for developers and organizations.

36% of global internet traffic originated from bots

Cyberattacks are increasingly targeting multiple customers, with 91% of attacks employing mass scanning to exploit vulnerabilities.

Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers

Multiple vulnerabilities in Palo Alto Networks' Expedition tool could allow attackers to access sensitive data and files.
Palo Alto Networks has released patches to address the critical flaws in the Expedition migration tool.

Google's AI bug hunters sniff out two dozen-plus code flaws

Google's OSS-Fuzz enhances software security by identifying vulnerabilities with AI-driven techniques, notably finding flaws that human testers often miss.

Zero Day Initiative - Multiple Vulnerabilities in the Mazda In-Vehicle Infotainment (IVI) System

Mazda Connect CMU system has critical vulnerabilities allowing root access through physical USB connections.
Problems arise from poor input sanitization, enabling malicious exploitation.

Australia and Google turn to AI to protect critical infrastructure

Australia is partnering with Google to enhance the cybersecurity of critical national infrastructure through automated flaw detection in software supply chains.

Want developers to build secure software? You need to ditch these two programming languages

Programming languages like C and C++ are vulnerable to memory safety issues, increasing security risks for developers and organizations.

36% of global internet traffic originated from bots

Cyberattacks are increasingly targeting multiple customers, with 91% of attacks employing mass scanning to exploit vulnerabilities.

Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers

Multiple vulnerabilities in Palo Alto Networks' Expedition tool could allow attackers to access sensitive data and files.
Palo Alto Networks has released patches to address the critical flaws in the Expedition migration tool.

Google's AI bug hunters sniff out two dozen-plus code flaws

Google's OSS-Fuzz enhances software security by identifying vulnerabilities with AI-driven techniques, notably finding flaws that human testers often miss.

Zero Day Initiative - Multiple Vulnerabilities in the Mazda In-Vehicle Infotainment (IVI) System

Mazda Connect CMU system has critical vulnerabilities allowing root access through physical USB connections.
Problems arise from poor input sanitization, enabling malicious exploitation.
morecybersecurity
#rust

White House recommends use of memory-safe languages like Python

Memory-safe programming languages recommended by White House report
Python's role in memory-safety highlighted by Python Software Foundation and Cryptography library's migration to Rust.

Boffins carve up C so code can be converted to Rust

A method to convert C code to Rust has been developed to enhance memory safety in software.

White House recommends use of memory-safe languages like Python

Memory-safe programming languages recommended by White House report
Python's role in memory-safety highlighted by Python Software Foundation and Cryptography library's migration to Rust.

Boffins carve up C so code can be converted to Rust

A method to convert C code to Rust has been developed to enhance memory safety in software.
morerust

Secure software development education report from the Linux Foundation | App Developer Magazine

Urgent need for formalized industry education and training programs in secure software development.

Microsoft Crashes it's service! Why We Need an Open Source Future

Microsoft outage caused by third-party update resulted in global disruptions

US, allies say North Korean hackers steal military secrets DW 07/25/2024

North Korean hackers, known as Anadriel, target defense and engineering companies globally for classified military secrets to support Pyongyang's nuclear program.
#open-source-software

The internet is built on unpaid labour take it away, and the whole thing crumbles

Open source software relies heavily on the unpaid labor of hobbyists.
Small projects can have a significant impact on modern digital infrastructure.

Open source is not insecure

Open source software relies on trust in authors and contributors.
Security of open source improves with source code transparency.

The internet is built on unpaid labour take it away, and the whole thing crumbles

Open source software relies heavily on the unpaid labor of hobbyists.
Small projects can have a significant impact on modern digital infrastructure.

Open source is not insecure

Open source software relies on trust in authors and contributors.
Security of open source improves with source code transparency.
moreopen-source-software

Optus breach is a wake-up call for secure coding practices

Coding error in Optus Mobile systems led to a major data breach affecting over nine million customers, emphasizing the critical importance of secure coding practices.
[ Load more ]