Remove application-security open-source-flaws-take-years-to-find-but-just-a-month-to-fix
article thumbnail

NEW TECH: WhiteSource leverages automation to mitigate lurking open-source vulnerabilities

The Last Watchdog

Just like the best sourdough bread derives from a “mother” yeast that gets divided, passed around, and used over and over, open-source software applications get fashioned from a “mother” library of code created and passed around by developers. Related: Equifax hack highlights open source attack vectors.

Software 179
article thumbnail

Key Takeaways From State of Software Security v11: Open Source Edition

Veracode Security

We recently published a special open source edition of our annual State of Software Security (SOSS) report. The State of Software Security v11: Open Source Edition analyzed the data collected from 13 million scans of more than 86,000 repositories, containing more than 301,000 unique libraries.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

This story is about the victims of a particularly aggressive business ID theft ring that’s spent years targeting small businesses across the country and is now pivoting toward using that access for pandemic assistance loans and unemployment benefits. For the past several months, Milwaukee, Wisc. Short Hills, N.J.-based

article thumbnail

Why big companies ignore SAP security patches ? and how that could bite them, big time

The Last Watchdog

Related article: Triaging open-source exposures. Finding a coding or design flaw on Windows OS can point the way to unauthorized to access to a treasure trove of company networks that use Windows. The same holds true for probing widely used open source protocols, as occurred when Heartbleed and Shellshock came to light.

article thumbnail

State of Software Security v11: Key Takeaways for Developers

Veracode Security

We recently released volume 11 of our annual State of Software Security (SOSS) report, which analyzes the security activity and history of applications Veracode scanned during a one-year period. This year???s s report also explores the idea of nature vs. nurture when remediating flaws and improving security.

article thumbnail

Teen Finds Vulnerability That Can 'Annoy the Sh*t' Out of Tesla Owners

SecureWorld News

Tesla is one car maker that is getting closer and closer to creating a fully electric, self-driving car, but it has hit some speed bumps along the way, specifically with security issues. Nonetheless, there should be no way at all that someone could literally walk up to some Teslas they do not own and take them for a drive.

article thumbnail

SBOMs: Securing the Software Supply Chain

eSecurity Planet

SBOMs directly address inefficiencies in the software development process that lead to a visibility gap between clients relying on the software’s functionality and the developer or supplier’s knowledge of its build and source components. Jump to: What is a Software Bill of Materials (SBOM)? What’s in a SBOM File?

Software 129