#vulnerability-detection

[ follow ]
Privacy technologies
fromTechzine Global
1 month ago

Google's AI Big Sleep discovers twenty new security vulnerabilities in open source

AI-powered vulnerability detector Big Sleep identified twenty new vulnerabilities in open-source software, leveraging collaboration between Google DeepMind and Project Zero.
#ethereum
fromHackernoon
2 months ago
Cryptocurrency

AVVERIFIER Outpaces Mythril and ETHBMC in Smart Contract Vulnerability Detection | HackerNoon

fromHackernoon
2 months ago
Cryptocurrency

AVVERIFIER Outpaces Mythril and ETHBMC in Smart Contract Vulnerability Detection | HackerNoon

#smart-contracts
fromThe Hacker News
2 months ago

Google AI "Big Sleep" Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act

An attacker who can inject arbitrary SQL statements into an application might be able to cause an integer overflow resulting in read off the end of an array.
Artificial intelligence
Artificial intelligence
fromWIRED
2 months ago

AI Agents Are Getting Better at Writing Code-and Hacking It as Well

AI models are becoming highly effective in detecting software vulnerabilities, revolutionizing cybersecurity.
fromSecuritymagazine
2 months ago

Product Spotlight on Risk Monitoring

CyberStrong is designed for enterprise-level cyber risk management, enabling quick identification and quantification of cyber risks while prioritizing controls using financial metrics.
Information security
Tech industry
fromZero Day Initiative
4 months ago

Zero Day Initiative - CVE-2024-44236: Remote Code Execution vulnerability in Apple macOS

Monitor specific ports to detect attacks exploiting this vulnerability.
Verify ICC Profile file transfers for suspicious characteristics to prevent potential attacks.
[ Load more ]