#vulnerability-detection

[ follow ]
Privacy technologies
fromTechzine Global
2 weeks ago

Google's AI Big Sleep discovers twenty new security vulnerabilities in open source

AI-powered vulnerability detector Big Sleep identified twenty new vulnerabilities in open-source software, leveraging collaboration between Google DeepMind and Project Zero.
#ethereum
fromHackernoon
1 month ago
Cryptocurrency

AVVERIFIER Outpaces Mythril and ETHBMC in Smart Contract Vulnerability Detection | HackerNoon

fromHackernoon
1 month ago
Software development

Why Most Smart Contract Analysis Tools Fail at Address Verification | HackerNoon

fromHackernoon
1 month ago
Cryptocurrency

AVVERIFIER Outpaces Mythril and ETHBMC in Smart Contract Vulnerability Detection | HackerNoon

fromHackernoon
1 month ago
Software development

Why Most Smart Contract Analysis Tools Fail at Address Verification | HackerNoon

#smart-contracts
fromHackernoon
1 month ago
Cryptocurrency

A Static Taint Analyzer for Address Verification Vulnerabilities in Ethereum | HackerNoon

fromHackernoon
1 month ago
Software development

How a Three-Phase Detector Identifies Smart Contract Vulnerabilities | HackerNoon

fromHackernoon
1 month ago
Cryptocurrency

A Static Taint Analyzer for Address Verification Vulnerabilities in Ethereum | HackerNoon

fromHackernoon
1 month ago
Software development

How a Three-Phase Detector Identifies Smart Contract Vulnerabilities | HackerNoon

fromThe Hacker News
1 month ago

Google AI "Big Sleep" Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act

An attacker who can inject arbitrary SQL statements into an application might be able to cause an integer overflow resulting in read off the end of an array.
Artificial intelligence
fromWIRED
2 months ago

AI Agents Are Getting Better at Writing Code-and Hacking It as Well

AI models are becoming highly effective in detecting software vulnerabilities, revolutionizing cybersecurity.
fromSecuritymagazine
2 months ago

Product Spotlight on Risk Monitoring

CyberStrong is designed for enterprise-level cyber risk management, enabling quick identification and quantification of cyber risks while prioritizing controls using financial metrics.
Information security
Tech industry
fromZero Day Initiative
3 months ago

Zero Day Initiative - CVE-2024-44236: Remote Code Execution vulnerability in Apple macOS

Monitor specific ports to detect attacks exploiting this vulnerability.
Verify ICC Profile file transfers for suspicious characteristics to prevent potential attacks.
[ Load more ]