Synopsys Report Shows "Alarming" Increase in High-Risk Vulnerabilities

By

SBOMs cited as a necessary step in reducing risks.

High-risk vulnerabilities have increased at an "alarming" rate in the past five years, according to the eighth edition of the Open Source Security and Risk Analysis (OSSRA) report from Synopsys.

Since 2019, "high-risk vulnerabilities in the Retail and eCommerce sector jumped by 557%," the report states. "Comparatively, the Internet of Things (IoT) sector, with 89% of the total code being open source, saw a 130% increase in high-risk vulnerabilities in the same period. Similarly, the Aerospace, Aviation, Automotive, Transportation, and Logistics vertical was found to have a 232% increase in high-risk vulnerabilities."

The report, which includes recommendations to help teams reduce risks associated with both open source and proprietary code, says the first step "involves a comprehensive inventory of all software a business uses, regardless of where it comes from or how it's acquired" – in other words, a Software Bill of Materials (SBOM).

"This is a foundational strategy towards understanding and reducing business risk by defending against software supply chain attacks," says Jason Schmitt, general manager of the Synopsys Software Integrity Group.

 
 

 
 

02/27/2023

Related content

  • News for Admins
    In the news: StarlingX 8.0 Edge Platform; Synopsys Report Shows "Alarming" Increase in High-Risk Vulnerabilities; Akamai Connected Cloud; Red Hat Enterprise Linux Available on Oracle Cloud; Wine 8.0; LibreOffice 7.5; Veracode Report Tracks Security Flaws Over the Application Lifecycle; and Malware Remains Top Cause of Cybersecurity Incidents.
  • Vulnerability assessment best practices for enterprises
    A vulnerability assessment is an important step toward protecting an organization's critical IT assets.
  • How to Use an SBOM
  • Test mechanisms for best practices in cloud design
    Develop resilient and efficient cloud infrastructures for enterprise applications with the AWS Well-Architected Framework. We show you how to implement the solutions from the framework in practical terms by providing an introduction to the AWS Well-Architected tool with an example.
  • Trivy security scanner
    The Trivy open source tool provides information on container and software security.
comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=