Remove Linux Remove Open Source Remove Report Remove Systems Administration
article thumbnail

4 Common Causes of False Positives in Software Security Testing

ForAllSecure

For example, Debian packages (which are used to install applications on Ubuntu and certain other Linux-based operating systems) can specify "recommended" dependencies as well as required dependencies. But some testing tools might not be sophisticated enough to distinguish between the two types of dependencies.

article thumbnail

Will Autonomous Security Kill CVEs?

ForAllSecure

How many of them did you report to the city? Vulnerability reporting works much the same way. Developers find bugs – and vulnerabilities – and don’t always report them. Unfortunately, the manual process to diagnose and report each one is a deterrent. That manual process is holding automated tools back.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Will Autonomous Security Kill CVEs?

ForAllSecure

How many of them did you report to the city? Vulnerability reporting works much the same way. Developers find bugs – and vulnerabilities – and don’t always report them. Unfortunately, the manual process to diagnose and report each one is a deterrent. That manual process is holding automated tools back.

article thumbnail

WILL AUTONOMOUS SECURITY KILL CVES?

ForAllSecure

How many of them did you report to the city? Vulnerability reporting works much the same way. Developers find bugs – and vulnerabilities – and don’t always report them. Unfortunately, the manual process to diagnose and report each one is a deterrent. That manual process is holding automated tools back.

article thumbnail

The Hacker Mind Podcast: Beyond MITRE ATT&CK

ForAllSecure

I’m reminded of when I trained to use Kali Linux. In some cases they’re taking open source, community-based tools and leveraging them in creative new ways against common threats. Because those are the same behaviors that real users real administrators are using. Is this just another report?

Tools 40