article thumbnail

RSAC insights: Software tampering escalates as bad actors take advantage of ‘dependency confusion’

The Last Watchdog

Log4J, aka Log4Shell, refers to a gaping vulnerability that exists in an open-source logging library that’s deeply embedded within servers and applications all across the public Internet. Its function is to record events in a log for a system administrator to review and act upon. I’ll keep watch and keep reporting.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

These were all obscure open-source components that, over time, became deeply embedded in enterprise systems across the breadth of the Internet, only to have a gaping vulnerability discovered in them late in the game. Log4j, for instance, is a ubiquitous logging library. I’ll keep watch and keep reporting.

Security 223
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

For instance, major vulnerability was discovered lurking in the GNU C Library, or GLIBC, an open source component that runs deep inside of Linux operating systems used widely in enterprise settings. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.

article thumbnail

DevOps Chat Podcast: $2M DARPA Award Sparks Behavior Testing With ForAllSecure's Mayhem Solution

ForAllSecure

And it uses heuristics to pick those inputs, and one of the things we built is a way to monitor that application as it runs and to inform the fuzzer on how to come up with new inputs that would get different behaviors. You have software component analysis, which looks for known vulnerable versions of libraries and other things, right?

article thumbnail

DevOps Chat Podcast: $2M DARPA Award Sparks Behavior Testing With ForAllSecure's Mayhem Solution

ForAllSecure

And it uses heuristics to pick those inputs, and one of the things we built is a way to monitor that application as it runs and to inform the fuzzer on how to come up with new inputs that would get different behaviors. You have software component analysis, which looks for known vulnerable versions of libraries and other things, right?

article thumbnail

DEVOPS CHAT PODCAST: $2M DARPA AWARD SPARKS BEHAVIOR TESTING WITH FORALLSECURE'S MAYHEM SOLUTION

ForAllSecure

And it uses heuristics to pick those inputs, and one of the things we built is a way to monitor that application as it runs and to inform the fuzzer on how to come up with new inputs that would get different behaviors. You have software component analysis, which looks for known vulnerable versions of libraries and other things, right?

article thumbnail

Will Autonomous Security Kill CVEs?

ForAllSecure

TwistLock, Anchore) check built docker image for out-of-date, vulnerable libraries. Despite the fact that fuzzers autonomously generates inputs that triggers bugs, shedding light on where to locate the bug and how to trigger it, researchers still opt not to report their findings. For example: Software Component Analysis tools (e.g.,