article thumbnail

Protestware on the rise: Why developers are sabotaging their own code

TechCrunch

His areas of interest include open source software security, malware analysis, data breaches, and scam investigations. A developer can, on a whim, change their mind and do whatever they want with their open source code that, most of the time, anyway comes “as is” without any warranty.

article thumbnail

Google Play is an ‘order of magnitude’ better at blocking malware

The Parallax

During a month that’s seen Android malware new and old plague the world’s most popular mobile operating system, Google says its Play Store is becoming more civilized and less like the Wild West. You have a lower probability of being infected by malware from Play than being hit by lightning,” Ahn says. READ MORE ON ANDROID SECURITY.

Malware 184
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Socket lands $4.6M to audit and catch malicious open source code

TechCrunch

Securing the software supply chain is admittedly somewhat of a dry topic, but knowing which components and code go into your everyday devices and appliances is a critical part of the software development process that billions of people rely on every day. That also means a reliance on trusting that the developers will always act in good faith.

article thumbnail

10 things to watch out for with open source gen AI

CIO

Enterprises are allowed to use the models commercially, and for developers to create and distribute additional work on top of the base Llama models, but they’re not allowed to use Llama outputs to improve other LLMs unless they are themselves Llama derivatives. Many model developers are talking about using curated data,” she says.

article thumbnail

Government Advisories Warn of APT Activity Resulting from Russian Invasion of Ukraine

Tenable

Government agencies publish warnings and guidance for organizations to defend themselves against advanced persistent threat groups. The alert highlights the following sectors as key targets for the APT groups: defense industrial base, healthcare and public health, energy, telecommunications and government facilities. Government.

article thumbnail

Cybersecurity Snapshot: CISOs Value Prevention Over Response, While CISA Urges Cyber Teams To Prep for Quantum Attacks

Tenable

government says public- and private-sector organizations alike must start getting ready now – especially critical infrastructure operators. The vast majority of enterprises polled – 95% – experienced multiple cyberattacks in the past 12 months, with phishing (74%), malware (60%) and software vulnerability exploits (50%) being the most common.

Malware 98
article thumbnail

Hidden inside Dark Caracal’s espionage apps: Old tech

The Parallax

Its success was predicated not on “zero-day” vulnerabilities or new forms of malicious software, but rather on older, known malware delivered via an all-too-familiar method: phishing. The malware included hacked versions of end-to-end encrypted communication apps Signal and WhatsApp.

Malware 170