Remove code-protection-how-protect-your-source-code
article thumbnail

Source Code Leak – What We Learned and How You Can Protect Your IP

McAfee

This week we learned about a leak of source code from 50 prominent companies , posted by a Swiss IT consultant. These come after another recent leak of source code from Nintendo, prompting us to comment on the issue of IP protection and secure development pipelines. . How You Can Protect Your IP .

InfoSec 52
article thumbnail

Expanding the Have I Been Pwned Volunteer Community

Troy Hunt

Ever notice how there was a massive gap of almost 9 months between announcing the intention to start open sourcing Have I Been Pwned (HIBP) in August last year and then finally a couple of weeks ago, actually taking the first step with Pwned Passwords ? How much code would I be reviewing? Code enhancements.

Passwords 348
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: The many benefits of infusing application security during software ‘runtime’

The Last Watchdog

Log4j, a widely publicized zero day vulnerability, was first identified in late 2021, yet security teams are still racing to patch and protect their enterprise apps and services. However, the most significant protection against zero day and other attacks comes from using security technologies that sit very close to how your application works.

Software 211
article thumbnail

Lapsus$: The New Name in Ransomware Gangs

Security Boulevard

In the case of Nvidia , the gang stole and leaked the credentials of more than 71,000 Nvidia employees, source code of Nvidia’s DLSS (Deep Learning Super Sampling) AI rendering technology and information about six supposed unannounced GPUs. The threat of stolen code signing certificates. How to protect your code signing keys.

article thumbnail

How to protect your site against lethal unauthorized code injections

CyberSecurity Insiders

This blog was written by an independent guest blogger. Lethal unauthorized code injections like XXS (cross site scripting) attacks are some of the most dynamic cyber-attacks. The standardized set of directives that can be enforced by a CSP tells the browser what sources are trustworthy and which ones to block. Read full post.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

How Thales and Red Hat Protect Telcos from API Attacks madhav Thu, 02/22/2024 - 04:55 Application programming interfaces (APIs) power nearly every aspect of modern applications and have become the backbone of today’s economy. Unfortunately, API attacks are increasing as vectors for security incidents. What are APIs?

article thumbnail

Stop Ransomware in its Tracks With CipherTrust Transparent Encryption Ransomware Protection

Thales Cloud Protection & Licensing

Stop Ransomware in its Tracks With CipherTrust Transparent Encryption Ransomware Protection madhav Wed, 04/17/2024 - 05:22 Our last blog Ransomware Attacks: The Constant and Evolving Cybersecurity Threat described the ever dangerous and evolving cybersecurity threat of ransomware. As such, it would not be detected at process load time.