XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor

Read about a supply chain attack that involves XZ Utils, a data compressor widely used in Linux systems, and learn how to protect from this threat.

By |2024-04-08T18:47:15+00:00April 8, 2024|cybersecurity, debian, Developer, developers, fedora, linux, Open source, open source security, red hat, Security, social engineering, supply chain attack, ubuntu, Uncategorized|Comments Off on XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor

Google Offers Bug Bounties for Generative AI Security Vulnerabilities

Google's Vulnerability Reward Program offers up to $31,337 for discovering potential hazards. Google joins OpenAI and Microsoft in rewarding AI bug hunts.

By |2023-10-31T19:36:12+00:00October 31, 2023|Artificial Intelligence, artificial intelligence security, bug bounties, generative ai, Google, Google Bard, International, Open source, open source security, Security, supply chain security, Uncategorized, vulnerabilities|Comments Off on Google Offers Bug Bounties for Generative AI Security Vulnerabilities

Top 10 open-source security and operational risks of 2023

Many software companies rely on open-source code but lack consistency in how they measure and handle risks and vulnerabilities associated with open-source software, according to a new report. The post Top 10 open-source security and operational risks o...

By |2023-03-03T21:50:33+00:00March 3, 2023|CXO, cybersecurity, Developer, Open source, open source security, open source software, Project Management, Security, Software, Uncategorized|Comments Off on Top 10 open-source security and operational risks of 2023
Go to Top