News March 25, 2024 Can memory-safe programming languages kill 70% of security bugs? 3 min read - The Office of the National Cyber Director (ONCD) recently released a new report, “Back to the Building Blocks: A Path Toward Secure and Measurable Software.” The report is one of the first major announcements from new ONCD director Harry Coker…
Security Services March 28, 2022 Low-code is easy, but is it secure? 4 min read - Low-code and no-code solutions are awesome. Why? With limited or no programming experience, you can quickly create software using a visual dashboard. This amounts to huge time and money savings. But with all this software out there, security experts worry…
September 25, 2019 Zebrocy Malware Receives Updated Downloaders, Backdoor in New Attack Campaign 2 min read - Attackers launched a new campaign that leveraged updated downloaders and a backdoor to distribute samples of the Zebrocy malware family.
July 3, 2019 Godlua Backdoor Capable of Performing DDoS Attacks 2 min read - Both versions of the Godlua backdoor, discovered in late April, are capable of performing distributed denial-of-service (DDoS) attacks, according to a new report.
June 18, 2019 InterPlanetary Storm Malware Using IPFS P2P Network to Hide Its Activities 2 min read - A malware campaign dubbed InterPlanetary Storm is hiding its network activity among legitimate traffic by using a P2P network for its command-and-control communications.
December 5, 2017 Fresh Additions Give PHP Programming a Business Boost 2 min read - The latest version of the PHP programming language provides support for improved password hashing and high-speed cryptography.
Application Security September 13, 2017 Don’t Constrict Your Cyber Potential in 2017 — Upskill With Python Programming Language 3 min read - The highly versatile Python programming language enables developers to write software for penetration testing, web development, applications and more.
Network July 14, 2017 The Limits of Linguistic Analysis for Security Attribution 2 min read - Linguistic analysis can provide clues to help security analysts trace the source of a cyberattack, but the method is inconclusive on its own.
Software Vulnerabilities March 6, 2015 WordPress and the GHOST Vulnerability 3 min read - WordPress and its users may be vulnerable to the recently reported GHOST vulnerability through a remote, unauthenticated attacker.
Threat Intelligence March 7, 2013 Can You Get Rid of Java? 2 min read - Java suffers the most malware infections of any programming language and recent zero-day exploits now warrant removing it from business applications.