#vulnerability-detection

[ follow ]
#ethereum
fromHackernoon
2 weeks ago
Cryptocurrency

AVVERIFIER Outpaces Mythril and ETHBMC in Smart Contract Vulnerability Detection | HackerNoon

fromHackernoon
2 weeks ago
Software development

Why Most Smart Contract Analysis Tools Fail at Address Verification | HackerNoon

fromHackernoon
2 weeks ago
Cryptocurrency

AVVERIFIER Outpaces Mythril and ETHBMC in Smart Contract Vulnerability Detection | HackerNoon

fromHackernoon
2 weeks ago
Software development

Why Most Smart Contract Analysis Tools Fail at Address Verification | HackerNoon

#smart-contracts
fromHackernoon
2 weeks ago
Cryptocurrency

A Static Taint Analyzer for Address Verification Vulnerabilities in Ethereum | HackerNoon

fromHackernoon
2 weeks ago
Software development

How a Three-Phase Detector Identifies Smart Contract Vulnerabilities | HackerNoon

fromHackernoon
2 weeks ago
Cryptocurrency

A Static Taint Analyzer for Address Verification Vulnerabilities in Ethereum | HackerNoon

fromHackernoon
2 weeks ago
Software development

How a Three-Phase Detector Identifies Smart Contract Vulnerabilities | HackerNoon

fromThe Hacker News
2 weeks ago

Google AI "Big Sleep" Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act

An attacker who can inject arbitrary SQL statements into an application might be able to cause an integer overflow resulting in read off the end of an array.
Artificial intelligence
fromWIRED
1 month ago

AI Agents Are Getting Better at Writing Code-and Hacking It as Well

AI models are becoming highly effective in detecting software vulnerabilities, revolutionizing cybersecurity.
fromSecuritymagazine
1 month ago

Product Spotlight on Risk Monitoring

CyberStrong is designed for enterprise-level cyber risk management, enabling quick identification and quantification of cyber risks while prioritizing controls using financial metrics.
Information security
Tech industry
fromZero Day Initiative
2 months ago

Zero Day Initiative - CVE-2024-44236: Remote Code Execution vulnerability in Apple macOS

Monitor specific ports to detect attacks exploiting this vulnerability.
Verify ICC Profile file transfers for suspicious characteristics to prevent potential attacks.
DevOps
fromInfoQ
4 months ago

How GitHub Leverages CodeQL for Security

GitHub utilizes CodeQL for comprehensive security analysis, enabling automated detection and remediation of vulnerabilities in codebases.
[ Load more ]