Vulnerabilities in cryptographic libraries found through modern fuzzing

Recently patched vulnerabilities in MatrixSSL and wolfSSL, two open-source TLS/SSL implementations / libraries for embedded environments, have emphasized the great potential of using fuzzing to uncover security holes in implementations of cryptographic… Continue reading Vulnerabilities in cryptographic libraries found through modern fuzzing

CI Fuzz CLI: Open-source tool simplifies fuzz testing for C++

Fuzz testing helps developers protect their applications against memory corruptions, crashes that cause downtime, and other security issues, including DoS and uncaught exceptions. Code Intelligence has open-sourced a new security tool, CI Fuzz CLI, whi… Continue reading CI Fuzz CLI: Open-source tool simplifies fuzz testing for C++

Is Reading Windows Reserved Filenames Through a URL Valid for OS Enumeration?

I’m aware that writing a file with a reserved name such as CON.txt or CON.mp3, aux.txt, lpt1.html, etc. is not allowed by Windows and can be leveraged for enumeration.
However, what about reading a file with a reserved name?
For example, i… Continue reading Is Reading Windows Reserved Filenames Through a URL Valid for OS Enumeration?

In view of open source code which is open to all, is code obfuscation still sufficient or even relevant? [closed]

Many today use code obfuscation as a way to make it harder for the bad people to reverse engineer their code. However, in view of open source software which is open to all, is code obfuscation still sufficient to deter reverse engineering … Continue reading In view of open source code which is open to all, is code obfuscation still sufficient or even relevant? [closed]

Does code obfuscation serve any purpose for or have a place in Open Source software projects? [closed]

Many today use code obfuscation as a way to make it harder for the bad people to reverse engineer their code. However, does code obfuscation have any applicability to or have a place in Open Source software?

Continue reading Does code obfuscation serve any purpose for or have a place in Open Source software projects? [closed]

Zero day vulnerabilities & Cybersecurity Supply Chain Risk Management – how to move from a reactive posture to a proactive posture? [duplicate]

I refer to the Log4j logging framework vulnerability – Source: https://www.wired.com/story/log4j-flaw-hacking-internet/
Since software vulnerabilities is an inevitable part of life, and speed is of an essence when it comes to patching vuln… Continue reading Zero day vulnerabilities & Cybersecurity Supply Chain Risk Management – how to move from a reactive posture to a proactive posture? [duplicate]