open source components

Linux Vendors Squawk: PATCH NOW — CVSS 9.8 Bootkit Bug in shim.efi
Richi Jennings | | BIOS, CVE-2023-40547, Enterprise Linux and Open Source, Linux, open source, Open Source and Software Supply Chain Risks, open source code, Open Source Community, open source components, open source development, Open Source Ecosystem, SB Blogwatch, secure boot, shim, UEFI, UEFI Failing, UEFI vulnerabilities
Snow joke: A Microsoft researcher found it—and it’s somehow Microsoft’s fault ...
Security Boulevard
Sierra Flaws Cyber Attack: Router Vulnerabilities Unveiled
Wajahat Raja | | Aleos Application Framework, CISA Advisories, Critical Sectors, Cyber Attack Risk Assessment, Cybersecurity, Cybersecurity News, Forescout Vedere Labs, Internet of things, Network Security, open source components, OpenNDS, operational technology, patch management, perimeter devices, router vulnerabilities, security measures, Sierra Flaws Cyber Attack, Sierra Wireless, Supply Chain Risks, threat landscape, Timely Patching, TinyXML, zero-day exploits
In a recent scrutiny of Sierra wireless routers, Forescout’s Vedere Labs uncovered 21 novel vulnerabilities that, though relatively straightforward to exploit, pose historical challenges for enterprises to rectify. Forescout’s Vedere Labs outlined ...

5 Irrefutable Reasons to Prioritize Software Security
These days, technology is evolving at a pace like never before seen, forcing organizations into an “adapt or die” situation. And, as digital transformation accelerates, everyone is feeling the effects. DevOps leaders, ...

The Open Source Cookbook: Understanding Your Software Ingredients
Steven Zimmerman | | Application Security Awareness, Application Security Trends, Application Security Vulnerabilities, AppSec Tips & Best Practices, Blog, Open Source Analysis, open source components, Open Source Security, Software Composition Analysis
As I introduced in my last article, where we explored the variance among open source components, distros, and forks, open source software and modern application development can be equated to baking. This ...

Code Exposure: The Vulnerabilities in Your Code & Where They Originate
Stephen Gates | | Application Security, Application Security Trends, AppSec Testing, Blog, developers, open source components, Open Source Security, Secure Coding, Security Vulnerabilities
Code Exposure: The Vulnerabilities in Your Code & Where They Originate Typical software applications are comprised of two types of code: custom code created by your internal development teams, and third-party code ...

The Open Source Cookbook: A Baker’s Guide to Modern Application Development
Steven Zimmerman | | Blog, Linux, open source, open source components, Open Source Projects, open-source-software, OSA, Software Security, Technical Blog
It is often said that open source software is like a recipe. In this context, let’s discuss your grandmother’s favorite cookies. It’s quite possible your grandmother is known throughout the family as ...