Stay a step ahead with the missing link in cybercrime defense: OSINT

Stay a step ahead with the missing link in cybercrime defense: OSINT

Chief Information Security Officers (CISOs) require a comprehensive set of tools, services and skilled people to succeed in the never-ending battle against cybercrime. They stand as the last line of defense to protect their organizations from losing data, money, reputation and, in extreme cases, the business itself. Adding OSINT-driven threat intelligence to the CISO toolkit can be a game-changer, delivering insights that enable a more proactive rather than reactive approach to cybercrime defenses. Whether launched…

Read More

XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor

XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor

A threat actor quietly spent the last two years integrating themself in the core team of maintainers of XZ Utils, a free software command-line data compressor widely used in Linux systems. The attacker slowly managed to integrate a backdoor in the software that was designed to interfere with SSHD and allow remote code execution via an SSH login certificate. The backdoor was discovered a few days before being released on several Linux systems worldwide. The…

Read More

Open source developer tools have won: That’s a supply chain risk

Open source developer tools have won: That’s a supply chain risk

It’s a done deal. In terms of market share, mindshare and innovation, open source developer tools have won the battle for the hearts and tool belts of engineers everywhere. From IDEs to build tools to package managers, open source has become the backbone of modern software development environments.  While this is a clear triumph for open source, we must also acknowledge the elephant in the room — the potential for massive supply chain risks. Developer…

Read More

Google Offers Bug Bounties for Generative AI Security Vulnerabilities

Google Offers Bug Bounties for Generative AI Security Vulnerabilities

Google’s Vulnerability Reward Program offers up to $31,337 for discovering potential hazards. Google joins OpenAI and Microsoft in rewarding AI bug hunts. Image: Markus Mainka/Adobe Stock Google expanded its Vulnerability Rewards Program to include bugs and vulnerabilities that could be found in generative AI. Specifically, Google is looking for bug hunters for its own generative AI, products such as Google Bard, which is available in many countries, or Google Cloud’s Contact Center AI, Agent Assist….

Read More

Can developers reduce open source cybersecurity risk?

Can developers reduce open source cybersecurity risk?

Can developers reduce open source cybersecurity risk? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Open source software security act introduced

Open source software security act introduced

Open source software security act introduced | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Modernizing application security to retool DevSecOps

Modernizing application security to retool DevSecOps

<!– Modernizing application security to retool DevSecOps | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Musk’s Twitter takeover and its security implications

Musk’s Twitter takeover and its security implications

Musk’s Twitter takeover and its security implications | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

How to manage the endemic nature of open-source software

How to manage the endemic nature of open-source software

How to manage the endemic nature of open-source software | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

CISOs to developers: Changing the way organizations look at authorization policy

CISOs to developers: Changing the way organizations look at authorization policy

CISOs to developers: Changing the way organizations look at authorization policy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More
1 2