It’s Time to Understand Risk in The Software Supply Chain

By now, everyone has heard about the malicious December 2020 attack on SolarWinds’ Orion software platform, which affected…
The post It’s Time to Understand Risk in The Software Supply Chain appeared first on ZeroNorth.
The post It’s Time to Understand… Continue reading It’s Time to Understand Risk in The Software Supply Chain

Could a virus force a phone to download an app and spread it?

I’m writing a sci-fi story that includes a malicious app that spreads globally. The developer publishes an app without knowing it’s infected, and it spreads because it forces phones to download it. Are there any mechanisms that might make … Continue reading Could a virus force a phone to download an app and spread it?

How to verify integrity of software when the download provider doesn’t publish hashes?

I noticed that certain software does not provide hash anymore nowadays.
E.g.

Zoom

https://zoom.us/download
wolf@linux:~$ ls -lh zoom_amd64.deb
-rw-rw-r– 1 wolf wolf 44M Jan 1 00:00 zoom_amd64.deb
wolf@linux:~$

I’ve googled both md5… Continue reading How to verify integrity of software when the download provider doesn’t publish hashes?

Details on the New NIST Requirement for RASP and IAST

If you’re looking for more information on the latest update to the NIST (National Institute of Standards and Technologies) Security and Privacy Framework outlined in SP800-53, there’s a new article just published in the Cutter Business Technology Journ… Continue reading Details on the New NIST Requirement for RASP and IAST