![Kubescape](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101027/kubescape2-400x200.jpg)
Kubescape 3.0 elevates open-source Kubernetes security
Targeted at the DevSecOps practitioner or platform engineer, Kubescape, the open-source Kubernetes security platform has reached version 3.0. Vulnerability scan results …
![Logging Made Easy](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/30110319/logging-made-easy-1400-400x200.jpg)
Logging Made Easy: Free log management solution from CISA
CISA launched a new version of Logging Made Easy (LME), a straightforward log management solution for Windows-based devices that can be downloaded and self-installed for free. …
![Raven](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/26101122/raven-cicd_security_scanner-400x200.jpg)
Raven: Open-source CI/CD pipeline security scanner
Raven (Risk Analysis and Vulnerability Enumeration for CI/CD) is an open-source CI/CD pipeline security scanner that makes hidden risks visible by connecting the dots across …
![GOAD](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/22211853/goad-game_of_active_directory-1400-400x200.jpg)
GOAD: Vulnerable Active Directory environment for practicing attack techniques
Game of Active Directory (GOAD) is a free pentesting lab. It provides a vulnerable Active Directory environment for pen testers to practice common attack methods. GOAD-Light: …
![Wazuh](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/22102528/wazuh-1300-400x200.jpg)
Wazuh: Free and open-source XDR and SIEM
Wazuh is an open-source platform designed for threat detection, prevention, and response. It can safeguard workloads in on-premises, virtual, container, and cloud settings. …
![ELITEWOLF](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/16142450/elitewolf-1400-400x200.jpg)
ELITEWOLF: NSA’s repository of signatures and analytics to secure OT
Cyber entities continue to show a persistent interest in targeting critical infrastructure by taking advantage of vulnerable OT assets. To counter this threat, NSA has …
![target](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/25133918/target2-400x200.jpg)
DIY attack surface management: Simple, cost-effective and actionable perimeter insights
Modern-day attack surface management (ASM) can be an intimidating task for most organizations, with assets constantly changing due to new deployments, assets being …
![Yeti](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/09181447/yeti_threat_intelligence-1400-400x200.jpg)
Yeti: Open, distributed, threat intelligence repository
Yeti serves as a unified platform to consolidate observables, indicators of compromise, TTPs, and threat-related knowledge. It enhances observables automatically, such as …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103829/Linux2-400x200.jpg)
GNOME users at risk of RCE attack (CVE-2023-43641)
If you’re running GNOME on you Linux system(s), you are probably open to remote code execution attacks via a booby-trapped file, thanks to a memory corruption …
![Chalk](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/29101547/chalk-crash_override-400x200.jpg)
Chalk: Open-source software security and infrastructure visibility tool
Chalk is a free, open-source tool that helps improve software security. You add a single line to your build script, and it will automatically collect and inject metadata into …
![Varun Sharma](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/18104737/varun_sharma-2-step_security-400x200.jpg)
Securing GitHub Actions for a safer DevOps pipeline
GitHub Actions provides a platform for continuous integration and continuous delivery (CI/CD), enabling your build, test, and deployment process automation. It allows you to …
![Network Flight Simulator](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/23135145/network_flight_simulator-1400-400x200.jpg)
Network Flight Simulator: Open-source adversary simulation tool
Network Flight Simulator is a lightweight utility that generates malicious network traffic and helps security teams evaluate security controls and network visibility. The tool …
Featured news
Resources
Don't miss
- 6 considerations for 2025 cybersecurity investment decisions
- BlackLock ransomware onslaught: What to expect and how to fight it
- Cybercriminals shift focus to social media as attacks reach historic highs
- The risks of autonomous AI in machine-to-machine interactions
- Balancing cloud security with performance and availability