home.aspx
 
EVENTS

Black Hat Asia 2020
BLACK HAT ASIA 2020
March 31-03, 2020
Black Hat returns to Marina Bay Sands in Singapore, March 31 - April 3, 2020. The information security community comes together for esteemed Trainings taught by industry experts, innovative research presentations at Briefings, the latest open-source tool demos in Arsenal, and the Business Hall featu...

 Aprimo Sync! 2020 (Global)
APRIMO SYNC! 2020 (GLOBAL)
April 07-09, 2020
Join us at Aprimo Sync! 2019 to experience peer-driven interactive discussions led by industry thought leaders, on-site and off-site networking opportunities with peers and leaders, and more. Early bird pricing is still available!

Code Dx

SHARESHARESHARE
Code Dx® 2.0 is a software vulnerability management system that consolidates and normalizes software vulnerabilities detected by multiple static application security testing (SAST) and dynamic application security testing (DAST) tools, as well as the results of manual code reviews. Its visual analytics accelerate the finding, triage, prioritizing and fixing of software vulnerabilities to dramatically expedite remediation. The Code Dx product was partially funded by the Department of Homeland Security (DHS) Science and Technology (S&T) Directorate due to the dire need to increase software assurance for critical infrastructure and secure the country’s software supply chain.
SHARESHARESHARE

RELATED NEWS


The cooperative nature of DevOps software delivery has done a lot to reduce friction between operations staff and developers, but looping security into the greater process still remains a challenge. According to a survey out today from Veracode, over half of developers report that security causes delays in the development process....
DARKREADING.COM
READ MORE

News that a hacking group within or associated with the National Security Agency compromised the firmware of hard drive controllers from a number of manufacturers as part of a 14-year cyber-espionage campaign has led some to believe that the manufacturers were somehow complicit in the hacking—either by providing source code to controller firmware or other technical support....
ARSTECHNICA
READ MORE

WINNIPEG -- A couple of 14-year-old computer whizzes have the Bank of Montreal upgrading its security after the teens hacked an ATM machine....
TORONTOSUN
READ MORE

A group of attackers with links to the Chinese hacking underground has been targeting companies from the entertainment and video game industries for years with the goal of stealing source code...
TECHWORLD
READ MORE

I found myself in somewhat of a unique position last week: I’d made the Ashley Madison data searchable for verified subscribers of Have I been pwned? (HIBP) and now – perhaps unsurprisingly in retrospect – I was being inundated with email. I mean hundreds of emails every day with people asking questions about the data. Not just asking questions, but often giving me their life stories as well....
TROYHUNT
READ MORE

Google will offer up-front grants of up to $3,133.70 to selected vulnerability researchers who will receive rewards regardless of whether they find a bug....
EWEEK
READ MORE

Everyone seems to be eager to pin the blame for the Sony hack on North Korea. However, I think it’s unlikely. Here’s why:1. The broken English looks deliberately bad and doesn’t exhibit any of the classic comprehension mistakes you actually expect to see in “Konglish”. i.e it reads to me like an English speaker pretending to be bad at writing English....
MARCROGERS
READ MORE

A system using images and a one-time numerical code can provide a secure and easy to use alternative to multiple device password systems like are used in online banking, researchers say....
IBTIMES
READ MORE

Juniper revised the list of ScreenOS versions that contain a backdoor allowing attackers to bypass authentication and gain administrative access to NetScreen enterprise firewall devices....
COMPUTERWORLD
READ MORE

The vulnerability, which may have been in place in some firewalls as far back as 2012 and which shipped with systems to customers until late 2013, allows an attacker to gain remote administrative access to systems with telnet or ssh access enabled. And now researchers have both confirmed that the backdoor exists and developed a tool that can scan for affected systems....
ARSTECHNICA
READ MORE

EVENTS

Black Hat Asia 2020
BLACK HAT ASIA 2020
March 31-03, 2020
Black Hat returns to Marina Bay Sands in Singapore, March 31 - April 3, 2020. The information security community comes together for esteemed Trainings taught by industry experts, innovative research presentations at Briefings, the latest open-source tool demos in Arsenal, and the Business Hall featu...

 Aprimo Sync! 2020 (Global)
APRIMO SYNC! 2020 (GLOBAL)
April 07-09, 2020
Join us at Aprimo Sync! 2019 to experience peer-driven interactive discussions led by industry thought leaders, on-site and off-site networking opportunities with peers and leaders, and more. Early bird pricing is still available!