A released June 26 by the Cybersecurity and Infrastructure Security Agency, FBI, the Australian Cyber Security Centre and Canadian Centre for Cybersecurity provides roadmaps for addressing memory safety vulnerabilities in open source software. The agencies explored a set of critical open source projects to determine the extent to which they were written in memory-unsafe languages and found that 52% of them had coding written in a memory-unsafe language, among other findings. The agencies determined that most critical open source projects analyzed, even those written in memory-safe languages, potentially contain memory safety vulnerabilities.  
  
鈥淭his report highlights the cyber risk of using potentially vulnerable open source code for internal coding projects or cyber risk exposure through third-party technology providers which may leverage open source code,鈥 said John Riggi, AHA national advisor for cybersecurity and risk. 鈥淯seful recommendations include targeted rewrites of critical components in memory-safe languages and insisting that third-party software developers reduce this risk by implementing 鈥榮ecure by design, secure by default principles,鈥 which we as a sector can drive by including 鈥榮ecurity by demand鈥 in our software purchase requirements.鈥 
 
For more information on this or other cyber and risk issues contact Riggi at jriggi@aha.org. For the latest cyber and risk threat information and resources visit www.aha.org/cybersecurity

Related News Articles

Headline
The FBI, Cybersecurity and Infrastructure Security Agency and international agencies July 29 released a joint advisory on recent tactics by the Scattered鈥
Headline
Microsoft July 22 released an update on the ongoing cyberattacks to SharePoint servers used within organizations, attributing the incidents to China-based鈥
Headline
The FBI, Cybersecurity and Infrastructure Security Agency, Department of Health and Human Services, and Multi-State Information Sharing and Analysis Center鈥
Headline
Microsoft July 19 issued an alert about active attacks from vulnerabilities targeting SharePoint servers used within organizations. The incidents have not鈥
Headline
In his latest AHA Cyber and Risk Intel blog, Scott Gee, AHA deputy national advisor for cybersecurity and risk, explains how hospitals can prepare for and鈥
AHA Cyber Intel
In today鈥檚 heightened threat environment, driven by domestic and geopolitical issues, it is more critical than ever for hospitals to prepare for and mitigate鈥