Click any tag below to further narrow down your results
Links
This article examines the average lifespan of kernel bugs, revealing they typically go undetected for over two years, with some lasting nearly 21 years. It highlights a tool that identifies historical bugs and discusses trends in bug discovery, particularly improvements in recent years.
Malcontent is a tool designed to detect supply-chain malware using context analysis and differential methods. It supports various file formats and programming languages, analyzing Linux programs primarily, but also works with macOS and Windows. It features three modes: analyze, diff, and scan, allowing for in-depth examination of program capabilities and risks.
This article provides a comprehensive analysis of the Shai Hulud 2.0 supply chain attack, detailing the compromised code libraries and the extent of the breaches. It also lists tools and methods for detecting and mitigating the impact of these attacks, emphasizing the importance of version pinning and runtime monitoring.
This article analyzes the quality, security, and maintainability of code generated by leading AI models like GPT-5.2 High and Gemini 3 Pro using SonarQube. It presents findings on functional performance, complexity, concurrency issues, and security vulnerabilities across various models.
MacPersistenceChecker is a macOS app that identifies all items set to run automatically on your system. It helps detect malware and unwanted software by scoring each persistence mechanism based on risk factors. Users can analyze and decide what to keep or remove.
The article details a supply chain attack on Notepad++, where attackers compromised the update infrastructure between June and September 2025. It outlines various infection chains, unique payloads, and the methods used to gather system information and install malicious software. Kaspersky's solutions successfully blocked these attacks as they unfolded.
Nova Proximity is a tool that scans Model Context Protocol servers and Agent Skills for security vulnerabilities. It detects issues like prompt injection and provides detailed analysis and remediation guidance based on NOVA rules. Users can discover tools, prompts, and assess server capabilities easily.
This article details the features of the Security Detections MCP server, which allows LLMs to query various security detection rules. It highlights enhancements like improved error handling, dynamic pattern extraction, and the introduction of 11 pre-built prompts for common security tasks.
This article reviews new macOS malware discovered in 2025, detailing infection methods, persistence techniques, and the functionality of each specimen. The focus is primarily on information stealers, highlighting their rise in prevalence and the tactics used to distribute them. It also provides links to malware samples for analysis.
This article introduces web-check, a tool for gathering open source intelligence on websites. It provides insights into various aspects like IP information, SSL certificates, DNS records, and server locations, helping users optimize and secure their own sites.
The article dissects the misinformation surrounding the React2Shell vulnerability (CVE-2025-55182) and clarifies the actual security risks. It highlights how misleading elements in a large patch caused confusion among researchers, leading to incorrect proofs of concept and assumptions about exploitability.
This article details TangleCrypt, a new Windows malware packer linked to a ransomware attack. It discusses its methods for hiding payloads and the flaws in its implementation that may lead to crashes. Key features include its use of multiple encoding layers and basic anti-analysis techniques.
JS Analyzer is a Burp Suite extension that helps identify API endpoints, secrets, and sensitive URLs in JavaScript files. It filters out irrelevant data for more accurate results and allows for real-time analysis and export of findings.
The OWASP Social OSINT Agent is a tool for gathering and analyzing open-source intelligence from various social media platforms. It uses advanced AI models to create structured reports from user activity, ensuring efficient data collection and analysis. The agent supports multiple platforms and includes features for error handling and caching.
This GitHub repository provides an open-source dataset of over 20,000 identified malicious software packages. It includes samples from npm, PyPI, and IDE extensions, along with tools for analysis. Users can check package versions for malicious intent and must handle the software with caution.
The content of the article appears to be corrupted or unreadable, making it impossible to extract meaningful information or context. It may require access to a different format or a fixed version to analyze its contents properly.
The content appears to be corrupted or not properly formatted, making it impossible to extract meaningful information or analyze the article's topic or key points. As such, a summary cannot be provided.
The content of the article appears to be corrupted or unreadable, making it impossible to extract any meaningful information or insights. It lacks coherent text or context that can be summarized effectively.
Loris is a sophisticated fuzz testing framework aimed at analyzing baseband firmware. It includes tools for analysis, emulation, and fuzzing, as detailed in the associated README files. For a deeper understanding, refer to the related research paper on its methodologies and findings.
The content appears to be a corrupted or encrypted file rather than a readable article. It does not provide coherent information or insights on any topic. Further analysis or decryption may be required to retrieve any meaningful content.
Microsoft Application Inspector is a tool designed to analyze software source code by identifying features based on a comprehensive set of over 400 rules and regex patterns. It aids in understanding software components for both security and non-security purposes and supports various programming languages, offering output in multiple formats. The tool is available as a command line application and NuGet package, and emphasizes community contributions for enhancing its feature detection capabilities.
Vulnerability research has become more complex due to improved security practices in software development, making it essential to leverage automated tools like Semgrep for efficient analysis. By employing single-repository variant analysis, researchers can uncover new vulnerabilities by examining patched code and public advisories, focusing on patterns that indicate similar vulnerabilities in the codebase. This approach allows for targeted analysis and reduced resource expenditure in vulnerability discovery.