norden.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Moin! Dies ist die Mastodon-Instanz für Nordlichter, Schnacker und alles dazwischen. Folge dem Leuchtturm.

Administered by:

Server stats:

3.4K
active users

#appsec

12 posts10 participants0 posts today

🌐 The Digital Terrain Is Shifting — Are Your Apps and APIs Ready?

As AI adoption accelerates, so do AI-driven attacks.
In their new research report, Akamai Technologies uncovers the evolving threats facing web applications and APIs — and how organizations can respond before attackers get ahead.

State of Apps and API Security 2025: How #AI Is Shifting the Digital Terrain explores the sharp rise in automated, intelligent threats — and the new defenses emerging to meet them.

📥 Download the full report here: itspm.ag/akamaixmwd
📌 Research like this helps #security professionals, #leaders, and #developers stay ahead of the curve — and shape the future of #digital defense.

🎙️ We’re also proud to feature Akamai in our RSAC 2025 coverage — with a Brand Story recorded pre-event and a follow-up conversation happening on location at the conference in San Francisco with Rupesh Chokshi, Sean Martin, CISSP, and Marco Ciappelli.

Watch the pre-event recording here: youtu.be/DMm6INJ_2Z8

🙏 A huge thank you to the Akamai team for sponsoring our coverage and sharing their insights with our global audience.

👇 Check out the report and stay tuned for more from RSAC:

📥 Download the Report: itspm.ag/akamaixmwd
🌐 Explore our RSAC 2025 Coverage: itspmagazine.com/events/rsac-2

Python now ships with 15,000 lines of verified cryptographic code from HACL*, covering all default hash and HMAC algorithms. The integration was seamless and automated, aiming to eliminate bugs like the 2022 SHA3 CVE. A major milestone for verified crypto in mainstream software.

jonathan.protzenko.fr/2025/04/

Jonathan Protzenko · 15,000 lines of verified cryptography now in PythonIn November 2022, I opened issue 99108 on Python’s GitHub repository, arguing that after a recent CVE in its implementation of SHA3, Python should embrace verified code for all of its hash-related infrastructure.