CVE-2020-10029: Buffer overflow in GNU libc trigonometry functions?!?

CVE-2020-10029: Buffer overflow in GNU libc trigonometry functions?!?

|
CVE-2020-10029 Vulnerabilities in the glibc functions cosl, sinl, sincosl, and tanl are due to an underlying common function. They ar fixed in glibc 2.32 ... Read More

CVE-2020-10029: Buffer overflow in GNU libc trigonometry functions?!?

|
CVE-2020-10029 Vulnerabilities in the glibc functions cosl, sinl, sincosl, and tanl are due to an underlying common function. They ar fixed in glibc 2.32 ... Read More

CVE-2020-10029: Buffer overflow in GNU libc trigonometry functions?!?

Remember trigonometry, where you were given the length of two sides of a triangle and had to compute the third side? We remembered vaguely SOH CAH TOA, but not much more. One thing we would have bet $50 on: That there wouldn’t be a buffer overflow in basic trigonometric functions ... Read More
WHY FUZZING IS YOUR FRIEND FOR DEVSECOPS

WHY FUZZING IS YOUR FRIEND FOR DEVSECOPS

|
ForAllSecure CEO David Brumley walks readers through the quality assurance technique that uncovers coding errors and security loopholes during software vulnerability testing and assurance processes ... Read More

Why Fuzzing Is Your Friend For DevSecOps

|
ForAllSecure CEO David Brumley walks readers through the quality assurance technique that uncovers coding errors and security loopholes during software vulnerability testing and assurance processes ... Read More

Why fuzzing is your friend for DevSecOps

Leaders proactively mitigate risk. One large risk they can mitigate is being blindsided by an unknown software vulnerability. Attackers who find an unknown vulnerability potentially can exploit all of an agency’s systems. When agency IT teams find a vulnerability first, they can make sure it is fixed or remediated before ... Read More

Game Theory: Why System Security Is Like Poker, Not Chess

|
The 1980’s film “Wargames” asked a computer to learn whether global thermonuclear war made sense. In the film, thermonuclear war didn’t make sense but what if, in real life, preemptive cyberattacks were our best hope for winning? Or better yet, what are the cyberwar scenarios and incentives when peace is ... Read More
GAME THEORY: WHY SYSTEM SECURITY IS LIKE POKER, NOT CHESS

GAME THEORY: WHY SYSTEM SECURITY IS LIKE POKER, NOT CHESS

|
The 1980’s film “Wargames” asked a computer to learn whether global thermonuclear war made sense. In the film, thermonuclear war didn’t make sense but what if, in real life, preemptive cyberattacks were our best hope for winning? Or better yet, what are the cyberwar scenarios and incentives when peace is ... Read More
Game Theory: Why System Security Is Like Poker, Not Chess

Game Theory: Why System Security Is Like Poker, Not Chess

|
The 1980’s film “Wargames” asked a computer to learn whether global thermonuclear war made sense. In the film, thermonuclear war didn’t make sense but what if, in real life, preemptive cyberattacks were our best hope for winning? Or better yet, what are the cyberwar scenarios and incentives when peace is ... Read More

Mayhem Moves to Production with the Department of Defense

In 2016, Mayhem -- then still a research prototype -- showed that fully autonomous cybersecurity was possible. This was just the first step ... Read More