Dhanush NWill Software Updates lead to Cyberattacks ?Software updates are critical for keeping systems functioning by fixing known vulnerabilities, so how can they contribute to cyberattacks…Sep 19
Taylor ArmerdinginNerd For TechRansomware is on a roll — and that’s more than a financial problemAfter decades of ransomware attacks, attackers still have the upper hand. Experts say that’s because of the failure to do security basics.Jul 14
Balaram DuttaSoftware Vulnerability Detection using Large Language ModelsLet us look at few of the examples.Feb 11Feb 11
CQR CompanyTop 10 Vulnerabilities in Smart Contracts: A Comprehensive GuideSmart contracts are crucial components of the blockchain ecosystem, automating the execution of agreements and ensuring that all parties…Jun 3Jun 3
Taylor ArmerdinginNerd For TechThe new CVSS standard: Details and more details. Too many details?The new standard for evaluating software vulnerabilities is heavy on context. Which is helpful but also complicated.Dec 4, 20232Dec 4, 20232
Dhanush NWill Software Updates lead to Cyberattacks ?Software updates are critical for keeping systems functioning by fixing known vulnerabilities, so how can they contribute to cyberattacks…Sep 19
Taylor ArmerdinginNerd For TechRansomware is on a roll — and that’s more than a financial problemAfter decades of ransomware attacks, attackers still have the upper hand. Experts say that’s because of the failure to do security basics.Jul 14
Balaram DuttaSoftware Vulnerability Detection using Large Language ModelsLet us look at few of the examples.Feb 11
CQR CompanyTop 10 Vulnerabilities in Smart Contracts: A Comprehensive GuideSmart contracts are crucial components of the blockchain ecosystem, automating the execution of agreements and ensuring that all parties…Jun 3
Taylor ArmerdinginNerd For TechThe new CVSS standard: Details and more details. Too many details?The new standard for evaluating software vulnerabilities is heavy on context. Which is helpful but also complicated.Dec 4, 20232
Chani BonnerA Beginner’s Guide to Null Pointer Dereference AttacksI get it. It’s hard to get nervous about null pointer dereference (NPD) attacks. What is a pointer exactly? Is dereferencing even a word…Feb 25
Taylor ArmerdinginNerd For TechNational Vulnerability Database delays cause major blind spot for software makers and usersThe National Vulnerability Database is way behind in its analyses of software vulnerabiities. NIST says it’s due to underfunding.Apr 15
Alex ChantavyinLyft EngineeringVulnerability Management at Lyft: Enforcing the Cascade [Part 1]Nov 17, 20226