XZ Utils Backdoor Still Lurking in Docker Images
https://www.binarly.io/blog/persistent-risk-xz-utils-backdoor-still-lurking-in-docker-images

XZ Utils Backdoor Still Lurking in Docker Images
https://www.binarly.io/blog/persistent-risk-xz-utils-backdoor-still-lurking-in-docker-images
“Car buyers get to see a window sticker—known as a Monroney sticker—when making purchasing decisions. Software buyers could benefit from their own “window sticker” when making purchasing decisions so that, just like with a car, they can see different “crash test ratings,” the origin of parts, and which features are available... This article explores what such a “window sticker” might look like in the context of [exploits]… by malicious actors.” #softwaresecurity #rating
https://mastodon.social/@lawfare/115021923917010405
One of my almae matres (?) is hiring!
From the LinkedIn announcement:
"The 𝐂𝐨𝐦𝐩𝐮𝐭𝐞𝐫 𝐒𝐜𝐢𝐞𝐧𝐜𝐞 department at UCLouvain (Belgium) will soon open 𝐭𝐡𝐫𝐞𝐞 𝐟𝐮𝐥𝐥-𝐭𝐢𝐦𝐞 𝐟𝐚𝐜𝐮𝐥𝐭𝐲 𝐩𝐨𝐬𝐢𝐭𝐢𝐨𝐧𝐬 targeting excellent profiles in the following domains:
- 2 Positions in one or more of these areas:
=> 𝐒𝐨𝐟𝐭𝐰𝐚𝐫𝐞 𝐞𝐧𝐠𝐢𝐧𝐞𝐞𝐫𝐢𝐧𝐠,
=> 𝐏𝐫𝐨𝐠𝐫𝐚𝐦𝐦𝐢𝐧𝐠 𝐬𝐲𝐬𝐭𝐞𝐦𝐬 𝐚𝐧𝐝 𝐥𝐚𝐧𝐠𝐮𝐚𝐠𝐞𝐬,
=> 𝐒𝐨𝐟𝐭𝐰𝐚𝐫𝐞 𝐝𝐞𝐩𝐞𝐧𝐝𝐚𝐛𝐢𝐥𝐢𝐭𝐲, 𝐢𝐧𝐜𝐥𝐮𝐝𝐢𝐧𝐠 𝐟𝐨𝐫𝐦𝐚𝐥 𝐦𝐞𝐭𝐡𝐨𝐝𝐬.
- 1 Position in 𝐬𝐨𝐟𝐭𝐰𝐚𝐫𝐞 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐜𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲, also broadly construed (e.g., system security, cyber-physical systems security, AI for security & security for AI, privacy, distributed systems security, etc.).
The three positions will be open to 𝐚𝐥𝐥 𝐬𝐞𝐧𝐢𝐨𝐫𝐢𝐭𝐲 𝐥𝐞𝐯𝐞𝐥𝐬 (assistant/associate or full)."
I loved the year that I spent at Université catholique de Louvain! I learned so much there, and every time I am back, I am welcomed with such open arms by the lovely people there. I'm happy where I am now at TU Delft, but seeing this announcement, my heart jumped and I admit that I did quickly check my profile against the positions that are opening.
#AcademicJobs #GetFediHired #AcademicMastodon #AcademicJob #SoftwareEngineering #ProgrammingLanguages #FormalMethods #SoftwareSecurity #CyberSecurity #Belgium #LLN #UniversitéCatholiquedeLouvain
#AcademicChatter
Claude Code's "natural language programming" marketing perpetuates dangerous myth that technical complexity can be abstracted away through conversational interfaces.
This represents fundamental misunderstanding: software systems require deep comprehension for reliable operation and maintenance.
Cognitive offloading to AI agents creates systemic technical debt and security vulnerabilities.
If you can’t see what’s inside your software, you can’t protect it. In this Brand Story episode, Theresa Lanowitz discusses what businesses need to do about software supply chain risk—and who should be asking the hard questions.
Calling all developers and AppSec pros!
Join Jim Manico on November 3–5 at OWASP Global AppSec USA 2025 for a 3-day, hands-on training experience.
REGISTER NOW: https://owasp.glueup.com/event/131624/register/
Ideal for beginners looking to build a strong, modern security foundation in both traditional and AI-driven environments.
#AI slop is doing considerable damage to the #Internet, #journalism (https://www.404media.co/the-medias-pivot-to-ai-is-not-real-and-not-going-to-work/) #programming (https://techcrunch.com/2025/07/11/ai-coding-tools-may-not-speed-up-every-developer-study-shows/), #SoftwareSecurity (https://daniel.haxx.se/blog/2025/07/14/death-by-a-thousand-slops/), #science (https://www.theguardian.com/science/2025/jul/13/quality-of-scientific-papers-questioned-as-academics-overwhelmed-by-the-millions-published)... and at what price? Wasting tons of energy, making the world step back on compromises to drop emissions when we should be hard working to stop the #ClimateChange. This is heartbreaking.
Please stop using #GenerativeAI
In 1984, Ken Thompson (co-creator of Unix) revealed a mind-bending idea: a compiler that could inject a backdoor into any program it compiled — even if the source code was clean. Worse, the compiler itself could be compiled from a backdoored compiler, making the malicious code invisible in both the program and its build tools. His lecture, “Reflections on Trusting Trust,” remains one of the most important warnings in software security history.
#KenThompson #TrustingTrust #SoftwareSecurity #HackingLore #CompilerHacks
Discover the delicate balance between innovation and security in AI-assisted coding. Embrace transparency, accountability, and ethical practices. #AI #Coding #SoftwareSecurity https://redoracle.com/News/Balancing-Innovation-and-Security-in-AI-Assisted-Coding.html
Für Kurzentschlossene: Gleich um 12:15 Uhr startet der #INNOQTechnologyLunch – heute dreht sich alles um Autorisierung. RBAC, ABAC, ReBAC, PBAC – Dominik Guhr gibt in seinem Talk einen kompakten Überblick über die verschiedenen Autorisierungsmodelle.
Livestream mit Q&A auf YouTube und LinkedIn
Jetzt noch schnell anmelden und bequem aus dem Homeoffice einschalten: https://www.meetup.com/innoq-technology-lunch/events/308525506/
Today we celebrate #OpenSSFCommunity Day NA 2025, welcoming six new member organizations and honoring incredible contributors with the Golden Egg Awards
.
Read the full update: https://openssf.org/blog/2025/06/26/openssf-welcomes-new-members-and-presents-golden-egg-award
Learn about CWE’s most important problems and where they fit within the challenges faced by the broader #vulnerabilitymanagement / #softwaresecurity ecosystem in this video from #VULNCON25
https://youtu.be/RcR-EFSptnQ #CVE #CWE
If your team dreads dependency upgrades,
chases false positives,
and struggles to prioritize vulns that matter...
This report from Endor Labs might help.
We at AppSec Village tools that bring clarity.
https://www.endorlabs.com/lp/dependency-management-report?utm_source=event&utm_medium=direct&utm_campaign=appsec-village
Job Alert
(Senior) Lecturer & Researcher Institut für Informatik | Schwerpunkt: Software Security
Deadline: 2025-07-20
Location: Austria, Wiener Neustadt
AI Coding Assistants Can be Both a Friend & a Foe
New research shows that GitLab's AI assistant, Duo, can be tricked into writing malicious code and even leaking private source data through hidden instructions embedded in developer content like merge requests and bug reports.
How? Through a classic prompt injection exploit that inserts secret commands into code that Duo reads. This results in Duo unknowingly outputting clickable malicious links or exposing confidential information.
While GitLab has taken steps to mitigate this, the takeaway is clear: AI assistants are now part of your attack surface. If you’re using tools like Duo, assume all inputs are untrusted, and rigorously review every output.
Read the details: https://arstechnica.com/security/2025/05/researchers-cause-gitlab-ai-developer-assistant-to-turn-safe-code-malicious/
Stop sniggering at the back! #SoftwareSecurity #ItsAThing
The Cyber Resilience Act (CRA) is shifting the burden of responsibility for open-source security. This is a necessary step. The easyjson discussion underscores that "free stuff" is not "free of responsibility". We, as software builders, must prioritize proactive risk assessment and due diligence. Josh Bressers latest blog post delves into this and advocates for a more mature approach to open-... https://anchore.com/blog/easyjson-and-foreign-influence-should-we-panic/ #CyberResilienceAct #opensource #softwaresecurity #riskmanagement #compliance
Announcing Anchore SBOM! This new Anchore Enterprise module allows users to manage their software supply chain by storing and processing SBOMs from 3rd parties or generated by any tool supporting common standards (SPDX, CycloneDX). Gain insight into what software is used across your environment. Read the full release: https://anchore.com/news/anchore-releases-bring-your-own-sbom/ #SoftwareSecurity #OpenSource #DevSecOps
Politic opinion in your Software is a grave Security Threat
The EU
to launch its own vulnerability database because the US is dropping the ball
— and the timing couldn’t be more telling
In response to growing digital sovereignty concerns, NIS2 compliance, and calls for vendor accountability, the EU is building a public vulnerability catalog. The goal? Track and disclose security bugs across government, industry, and open source
Complement—not compete with—the CVE Program
Increase trust, transparency, and resilience within the bloc
But let’s be honest: Multiple public vuln databases means we must align identifiers, disclosure standards, and data feeds—or risk fragmentation
Transparency is great, but what about verification, consistency, and maintenance?
And if vendors or agencies self-report, how do we ensure accuracy or prevent omission?
Done right, this could increase pressure on lagging suppliers and elevate accountability. But if we don’t connect the dots globally, we may just multiply confusion.
What do you think: smart evolution or coordination nightmare?
#CyberSecurity #VulnerabilityManagement #EU #CVE #NIS2 #SoftwareSecurity #Governance #security #privacy #cloud #infosec
https://www.theregister.com/2025/05/13/eu_security_bug_database/