![MITRE OpenARIA](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/02161124/mitre-openaria-400x200.webp)
OpenARIA: Open-source edition of the Aviation Risk Identification and Assessment (ARIA)
MITRE now offers an open-source version of its Aviation Risk Identification and Assessment (ARIA) software suite, OpenARIA. This initiative is dedicated to enhancing aviation …
![New infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115321/infosec-week-1200-400x200.jpg)
New infosec products of the week: March 8, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Check Point, Delinea, Pentera, and Sentra. Delinea Privilege Control for Servers …
![Tazama](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/05155253/tazama-open_source-400x200.webp)
Tazama: Open-source real-time fraud management
Tazama is an open-source platform focused on improving fraud management within digital payment systems. Tazama marks a substantial transformation in the approach to financial …
![RiskInDroid](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/29100746/riskindroid-1500-400x200.webp)
RiskInDroid: Open-source risk analysis of Android apps
RiskInDroid (Risk Index for Android) is an open-source tool for quantitative risk analysis of Android applications based on machine learning techniques. How RiskInDroid works …
![GitHub](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/27111139/github-27042023-01-400x200.jpg)
GitHub push protection now on by default for public repositories
GitHub push protection – a security feature aimed at preventing secrets such as API keys or tokens getting accidentally leaked online – is being switched on by …
![open source security](https://img.helpnetsecurity.com/wp-content/uploads/2022/04/13072028/open_source_security-400x200.jpg)
Securing software repositories leads to better OSS security
Malicious software packages are found on public software repositories such as GitHub, PyPI and the npm registry seemingly every day. Attackers use a number of tricks to fool …
![New infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115321/infosec-week-1200-400x200.jpg)
New infosec products of the week: March 1, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Legato Security, Exabeam, Spin.AI, and Viavi Solutions. Legato Security Ensemble …
![BobTheSmuggler](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/23173144/bobthesmuggler-1400-400x200.jpg)
BobTheSmuggler: Open-source tool for undetectable payload delivery
BobTheSmuggler is an open-source tool designed to easily compress, encrypt, and securely transport your payload. It basically enables you to hide a payload in plain sight. …
![Web Check](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/23141702/web_check_1400-400x200.jpg)
Web Check: Open-source intelligence for any website
Web Check offers thorough open-source intelligence and enables users to understand a website’s infrastructure and security posture, equipping them with the knowledge to …
![New infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115321/infosec-week-1200-400x200.jpg)
New infosec products of the week: February 23, 2024
Here’s a look at the most interesting products from the past week, featuring releases from ManageEngine, Metomic, Pindrop, and Truffle Security. Pindrop Pulse offers …
![TruffleHog](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/13134910/trufflehog-1400-400x200.jpg)
TruffleHog: Open-source solution for scanning secrets
TruffleHog is an open-source scanner that identifies and addresses exposed secrets throughout your entire technology stack. “TruffleHog was originally a research tool I …
![CVE Prioritizer](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/12143410/cve_prioritizer-1400-400x200.jpg)
CVE Prioritizer: Open-source tool to prioritize vulnerability patching
CVE Prioritizer is an open-source tool designed to assist in prioritizing the patching of vulnerabilities. It integrates data from CVSS, EPSS, and CISA’s KEV catalog to …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders