Whats So Strategic About the Trend Micro and Snyk Partnership?

Credit to Author: Trend Micro| Date: Tue, 08 Oct 2019 12:10:46 +0000

What does a partnership between Trend Micro and Snyk mean for you, the customer? Can you really develop and deploy applications anywhere without security slowing you down? Greg Young, VP of Cybersecurity for Trend Micro, explains how the partnership benefits Trend Micro and gives our customers an extra edge in their security platform.

The post Whats So Strategic About the Trend Micro and Snyk Partnership? appeared first on .

Read more

Five years later, Heartbleed vulnerability still unpatched

Credit to Author: Gilad Maayan| Date: Thu, 12 Sep 2019 15:00:00 +0000

The Heartbleed vulnerability was discovered and fixed in 2014, yet today—five years later—there are still unpatched systems.

Categories:

Tags:

(Read more…)

The post Five years later, Heartbleed vulnerability still unpatched appeared first on Malwarebytes Labs.

Read more

Everything you need to know about the Heartbleed vulnerability

Credit to Author: Malwarebytes Labs| Date: Fri, 30 Aug 2019 16:16:00 +0000

The Heartbleed vulnerability was discovered and fixed in 2014, yet today—five years later—there are still unpatched systems.

Categories:

Tags:

(Read more…)

The post Everything you need to know about the Heartbleed vulnerability appeared first on Malwarebytes Labs.

Read more

Miners snatching open source tools to strengthen their malevolent power!

Credit to Author: Anant Pulgam| Date: Fri, 26 Apr 2019 07:02:51 +0000

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. One of the ways to earn cryptocurrencies is to mine them. Nowadays cryptocurrency miner malware have become hot attack vectors for cybercriminals due to its ease of deployment and instant…

Read more

5 ways to find and fix open source vulnerabilities

Credit to Author: Malwarebytes Labs| Date: Tue, 17 Jul 2018 15:00:00 +0000

A recent discovery of surreptitious execution of cryptomining code by a sandboxed app, riding piggyback on the open source software (OSS) ecosystem, raises pertinent questions about open source vulnerabilities. Here are five ways developers can find and fix vulnerabilities and their dependencies.

Categories:

Tags:

(Read more…)

The post 5 ways to find and fix open source vulnerabilities appeared first on Malwarebytes Labs.

Read more

HackerOne offers bug bounty service for free to open-source projects

Credit to Author: Lucian Constantin| Date: Fri, 03 Mar 2017 12:41:00 -0800

HackerOne, the company behind one of the most popular vulnerability coordination and bug bounty platforms, has decided to make its professional service available to open-source projects for free.

“Here at HackerOne, open source runs through our veins,” the company’s representatives said in a blog post. “Our company, product, and approach is built on, inspired by, and driven by open source and a culture of collaborative software development. As such, we want to give something back.”

HackerOne is a platform that makes it easier for companies to interact with security researchers, triage their reports, and reward them. Very few companies have the necessary resources to build and maintain bug bounty programs on their own with all the logistics that such efforts involve, much less so open-source projects that are mostly funded through donations.

To read this article in full or to leave a comment, please click here

Read more