JavaScript bugs aplenty in Node.js ecosystem – found automatically

Credit to Author: Paul Ducklin| Date: Tue, 30 Aug 2022 16:59:14 +0000
How to get the better of bugs in all the possible packages in your supply chain?
Read more
Credit to Author: Paul Ducklin| Date: Tue, 30 Aug 2022 16:59:14 +0000
How to get the better of bugs in all the possible packages in your supply chain?
Read more
Credit to Author: Paul Ducklin| Date: Mon, 29 Aug 2022 16:59:25 +0000
What does the recent LastPass breach mean for password managers? Just a bump in the road, or a reason to ditch them entirely?
Read more
Credit to Author: Paul Ducklin| Date: Wed, 24 Aug 2022 18:59:07 +0000
One bit per second makes the Voyager probe data rate seem blindingly fast. But it’s enough to break your security assumptions…
Read more
Credit to Author: Paul Ducklin| Date: Fri, 26 Aug 2022 16:27:08 +0000
Two trust-spoofing bugs were the main culprits this month – but neither one was a zero-day.
Read more
Credit to Author: Paul Ducklin| Date: Thu, 25 Aug 2022 15:37:51 +0000
Latest episode – listen now! (Or read the transcript if you prefer the text version.)
Read more
Credit to Author: gallagherseanm| Date: Thu, 25 Aug 2022 11:00:35 +0000
The SophosAI Artificial Intelligence team has developed a machine-learning based tool that generates YARA rules for detecting specific types of threats
Read more
Credit to Author: Paul Ducklin| Date: Wed, 24 Aug 2022 16:59:07 +0000
One bit per second makes the Voyager probe data rate seem blindingly fast. But it’s enough to break your security assumptions…
Read more
Credit to Author: Paul Ducklin| Date: Tue, 23 Aug 2022 15:35:37 +0000
The criminals didn’t implant any malware. The attack was orchestrated via malevolent configuration changes.
Read more
Credit to Author: Paul Ducklin| Date: Mon, 22 Aug 2022 16:03:07 +0000
We haven’t validated this vuln ourselves… but the source of the story is impeccable. (Impeccably dressed, at least.)
Read more
Credit to Author: Doug Aamoth| Date: Mon, 22 Aug 2022 12:10:23 +0000
With perimeter boundaries quickly blurring thanks to remote care and telehealth, the implicit trust placed in perimeter-centric security makes healthcare dangerously vulnerable.
Read more