.NET Component Vulnerability Analysis in Production | Synopsys
Component vulnerability analysis requires access to composition metadata: build files, project files, manifests. What if these materials aren't available? Learn about .NET component vulnerability ...
'Active defense' is irresponsible | Software Integrity Blog
A look at the idea of “Active Defense”, which basically boils down to attacking the people who (may have) attacked you. Is it irresponsible?
‘Cyber Pearl Harbor’ unlikely, but critical infrastructure security needs an ...
Officials have been warning us for decades of a “cyber Pearl Harbor” or “cyber 9/11” kind of attack on the nation’s critical infrastructure. Are we prepared?
"Easy" to hack Apache Struts vulnerability CVE-2017-9805 | Synopsys
Dozens of Fortune 100 companies at risk after security researchers at lgtm.com discovered an easy to hack critical Apache Struts security flaw.
"PoisonTap" Steals Network Passwords | Synopsys
A new exploit tool requires only 30 seconds to install a privacy-invading backdoor on a previously locked computer.
/C O R R E C T I O N - Synopsys, Inc./
#BeBoldForChange on International Women's Day 2017 | Synopsys
What better way to celebrate International Women’s Day than by reading about the women of Synopsys who are achieving great success?
1.4 Billion Android Devices Vulnerable to Hijack Attacks | Synopsys
Roughly 80 percent of all Android devices contain a Linux vulnerability that affect unencrypted communications and allow attackers to hijack data.
10 critical cloud security threats in 2018 and beyond | Synopsys
Explore 10 critical cloud security threats: data breaches, human error, data loss, insider threats, DDoS attacks, insecure APIs, exploits, account hijacking, APTs, and CPU flaws.
10 emerging enterprise application security threats webinar | Synopsys
In Dark Reading’s on-demand webinar with Brad Causey (Zero Day Consulting) and Meera Rao (Synopsys), you’ll learn about 10 emerging enterprise application security threats to be aware of.