Software Integrity Blog

CyRC analysis: Circumventing WPA authentication in wireless routers with Defensics fuzz testing

Three WPA authentication bypass vulnerabilities were found in wireless routers using the Defensics fuzz testing tool.

Continue Reading...

AppSec Decoded: The security dilemma of IoT devices

In honor of National Cybersecurity Awareness Month, we’ve released a new video series that kicks off with a discussion on the future of IoT devices.

Continue Reading...

Get effective DevSecOps with version control

Learn how to use version control to reduce development time and increase the rate of successful software deployments in your DevSecOps strategy.

Continue Reading...

Synopsys’ Seeker IAST wins Best Cloud and Web Application Security category at CybersecAsia Awards

Seeker was recognized for its leadership and innovation in cloud and web-based application security. Learn how to improve your security posture with IAST.

Continue Reading...

Are you ready for ISO SAE 21434 Cybersecurity of Road Vehicles?

Don’t let cyber security take a back seat in the vehicle life cycle. Learn how to prepare for the upcoming ISO SAE 21434 standard for road vehicles.

Continue Reading...

The BSIMM: Five key steps to a better software security initiative

The goal of an SSI is to improve security at every stage of the journey. Start and/or improve your SSIs today with these key steps observed in BSIMM11.

Continue Reading...

Announcing Polaris support for GitHub Actions

New GitHub Action helps DevOps teams build fast while staying secure.

Continue Reading...

Can SAST tools improve developer productivity?

They can—if you have a SAST tool that helps developers find and fix real security defects rather than hindering their productivity with false positives. 

Continue Reading...

CyRC Vulnerability Advisory: Authentication bypass vulnerabilities in multiple wireless router chipsets (CVE-2019-18989, CVE-2019-18990, and CVE-2019-18991)

Read the Synopsys Cybersecurity Research Center’s (CyRC) analysis of CVE-2019-18989, CVE-2019-18990, and CVE-2019-18991.

Continue Reading...

Under pressure: Managing the competing demands of development velocity and application security

Nearly 50% of development teams knowingly release vulnerable code. Learn why vulnerabilities are overlooked and how you can improve application security.

Continue Reading...