Tag: Code Analysis
-
Google Introduces Project Naptime for AI-Powered Vulnerability Research
Google has developed a new framework called Project Naptime that it says enables a large language model (LLM) to carry out vulnerability …
-
Cross-Industry Report Identifies Top 10 Open-Source Software Risks
Promoted by Endor Labs and featuring contributions from over 20 industry experts, the new Endor Labs Station 9 report identifies the top …
-
GitHub Enhances CodeQL, Extends Language Support, Available Queries, and More
After adding support for Ruby at GitHub Universe 2022, CodeQL introduced Kotlin support in beta. Additionally, support for other languages …
-
How GitHub Uses Machine Learning to Extend Vulnerability Code Scanning
Applying machine learning techniques to its rule-based security code scanning capabilities, GitHub hopes to be able to extend them to less …
-
Facebook open-sources a static analyzer for Python code
Facebook has open-sourced Pysa (Python Static Analyzer), a tool that looks at how data flows through the code and helps developers prevent …
-
Automate manual security, risk, and compliance processes in software development
The future of business relies on being digital – but all software deployed needs to be secure and protect privacy. Yet, responsible …
-
Microsoft Application Inspector: Check open source components for unwanted features
Want to know what’s in an open source software component before you use it? Microsoft Application Inspector will tell you what it does …
-
Joker Android Malware Snowballs on Google Play
Google has removed 17,000 Android apps to date from the Play store that have been conduits for the Joker malware (a.k.a. Bread) – and in …
-
Code analysis tool Semmle joins GitHub
Semmle’s co-founder and CEO Oege de Moor explained GitHub was a natural fit for the company because of its open-source community and …
-
FLARE Script Series: Automating Objective-C Code Analysis with Emulation
This blog post is the next episode in the FireEye Labs Advanced Reverse Engineering (FLARE) team Script Series. Today, we are sharing a new …
-
Transitioning from DevOps to Rugged DevOps: Avoiding the pitfalls
more readily. This stands in contrast to conventional multi-week sprint cycles producing large amounts of code to be …
-
Malware analysis: decoding Emotet, part 2
In part two of our series on decoding Emotet, (you can catch up on part 1 here), we’ll cover analysis of the PowerShell code. Before we …
●●●