article thumbnail

Socket lands $4.6M to audit and catch malicious open source code

TechCrunch

Securing the software supply chain is admittedly somewhat of a dry topic, but knowing which components and code go into your everyday devices and appliances is a critical part of the software development process that billions of people rely on every day. That also means a reliance on trusting that the developers will always act in good faith.

article thumbnail

Top 5 Security Trends for CIOs

CIO

Cybersecurity cannot stand still, or the waves of innovation will overrun the shores. Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins. A second, more pernicious risk is the fact that ChatGPT can write malware.

Trends 317
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

WhiteSource Acquires Diffend to Secure Open Source Supply Chains

DevOps.com

WhiteSource this week announced it has acquired Diffend as part of an expended effort to discover malware that has been deliberately injected into open source software by a contributor acting in bad faith. The post WhiteSource Acquires Diffend to Secure Open Source Supply Chains appeared first on DevOps.com.

article thumbnail

Cybersecurity Snapshot: Cyber Agencies Offer Secure AI Tips, while Stanford Issues In-Depth AI Trends Analysis, Including of AI Security

Tenable

Check out recommendations for securing AI systems from the Five Eyes cybersecurity agencies. Meanwhile, a new open-source tool aims to simplify SBOM usage. Check out the AI security recommendations jointly published this week by cybersecurity agencies from the Five Eyes countries: Australia, Canada, New Zealand, the U.K.

article thumbnail

Cybersecurity Snapshot: CISOs Value Prevention Over Response, While CISA Urges Cyber Teams To Prep for Quantum Attacks

Tenable

Plus, why security leaders are prioritizing security prevention tools. Oh, and the White House wants your input on open source security. Time to start prepping for the quantum computing threat? CISA thinks so. Also, find out why ransomware attacks surged in July. And much more! 1 – The quantum computers are coming!

Malware 98
article thumbnail

Software supply chain security is broader than SolarWinds and Log4J

TechCrunch

Previously he was staff software engineer and lead for Google’s Open Source Security Team (GOSST). SolarWinds and Log4j have made software supply chain security issues a topic of intense interest and scrutiny for businesses and governments alike. Open source package repository attacks.

Software 225
article thumbnail

Cybersecurity Snapshot: CISA Calls on Software Makers To Use Memory Safe Languages, as OpenSSF Issues Secure Software Principles

Tenable

Meanwhile, the OpenSSF published 10 key principles for secure software development. Plus, malware used in fake browser-update attacks ballooned in Q3. Cybersecurity and Infrastructure Security Agency (CISA) issued a clarion call for software makers to use so-called “memory safe” programming languages. And much more!