Critical CocoaPods Flaws Exposed Many iOS, macOS Apps to Supply Chain Attacks 

EVA Information Security has shared details on three CocoaPods vulnerabilities impacting millions of macOS and iOS applications.
The post Critical CocoaPods Flaws Exposed Many iOS, macOS Apps to Supply Chain Attacks  appeared first on SecurityWeek.
Continue reading Critical CocoaPods Flaws Exposed Many iOS, macOS Apps to Supply Chain Attacks 

US, Allies Warn of Memory Unsafety Risks in Open Source Software

Most critical open source software contains code written in a memory unsafe language, US, Australian, and Canadian government agencies warn.
The post US, Allies Warn of Memory Unsafety Risks in Open Source Software appeared first on SecurityWeek.
Continue reading US, Allies Warn of Memory Unsafety Risks in Open Source Software

Low code, high stakes: Addressing SQL injection

Like a bad movie that seems to go on forever, SQL injection (SQLi) attacks have lingered since the late 1990s. Due to various factors, they remain the third most common source of web application vulnerabilities. Reasons include human error, new technol… Continue reading Low code, high stakes: Addressing SQL injection

59% of public sector apps carry long-standing security flaws

Applications developed by public sector organizations have more security debt than those created by the private sector, according to Veracode. Security debt, defined for this report as flaws that remain unfixed for longer than a year, exists in 59% of … Continue reading 59% of public sector apps carry long-standing security flaws

Critical Flaw in AI Python Package Can Lead to System and Data Compromise

A critical vulnerability tracked as CVE-2024-34359 and dubbed Llama Drama can allow hackers to target AI product developers.
The post Critical Flaw in AI Python Package Can Lead to System and Data Compromise appeared first on SecurityWeek.
Continue reading Critical Flaw in AI Python Package Can Lead to System and Data Compromise

Security tools fail to translate risks for executives

Organizations are struggling with internal communication barriers, which hinder their ability to address cybersecurity threats, according to Dynatrace. The results indicate that CISOs encounter challenges in aligning security teams with the C-suite, re… Continue reading Security tools fail to translate risks for executives

Adobe Adds Content Credentials and Firefly to Bug Bounty Program

Adobe is providing incentives for bug bounty hackers to report security flaws in its implementation of Content Credentials and Adobe Firefly.
The post Adobe Adds Content Credentials and Firefly to Bug Bounty Program appeared first on SecurityWeek.
Continue reading Adobe Adds Content Credentials and Firefly to Bug Bounty Program