open source
![RedEye](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/15145034/redeye-cisa-1280-400x200.jpg)
CISA releases RedEye open-source analytic tool
CISA has released RedEye, an interactive open-source analytic tool to visualize and report Red Team command and control activities. RedEye, available on GitHub, allows an …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13113507/opensource-blue-400x200.jpg)
New security concerns for the open-source software supply chain
Open-source software is a critical element of the software supply chain in companies of all sizes, but there are new security concerns for the open-source software supply …
![Constellation](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/05122601/constellation-open-source-kubernetes-400x200.jpg)
Constellation: Open-source, runtime-encrypted Kubernetes
Confidential Computing is a hardware-based technology that shields computer workloads from their environments and keeps data encrypted during processing. In this Help Net …
![vm2 vunerability](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/10111205/vm2_vunerability-400x200.jpg)
Critical vm2 sandbox escape flaw uncovered, patch ASAP! (CVE-2022-36067)
Oxeye researchers discovered a severe vm2 vulnerability (CVE-2022-36067) that has received the maximum CVSS score of 10.0. Called SandBreak, this new vulnerability requires …
![Dissect framework](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/05093918/dissect-framework-1280-400x200.jpg)
Dissect: Open-source framework for collecting, analyzing forensic data
A game changer in cyber incident response, the Dissect framework enables data acquisition on thousands of systems within hours, regardless of the nature and size of the IT …
![open source security](https://img.helpnetsecurity.com/wp-content/uploads/2022/04/13072028/open_source_security-400x200.jpg)
When transparency is also obscurity: The conundrum that is open-source security
Open-source software (OSS) has a lot of advocates. After all, why would we continuously try and write code that solves problems that others have already solved? Why not share …
![SpyCast](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/25192016/spycast_1280-400x200.jpg)
SpyCast: Cross-platform mDNS enumeration tool
SpyCast is a cross-platform mDNS enumeration tool that can work either in active mode by recursively querying services or in passive mode by only listening to multicast …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
The holy trifecta for developing a secure API
It’s hard to write good API specifications, and since most API gateways use them as IAC, they should be carefully checked for common mistakes. Writing an API that sticks …
![Wolfi Linux](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/20090833/wolfi-logo_hns-400x200.jpg)
Wolfi Linux provides the control needed to fix modern supply chain threats
There’s been a massive push for supply chain security in the last few years: integrity protection, vulnerability management, and transparency. This push has left …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2021/05/06144957/open-source-code-hns-400x200.jpg)
Open source projects under attack, with enterprises as the ultimate targets
Sonatype has found a massive year-over-year increase in cyberattacks aimed at open source projects. According to early data from Sonatype’s 8th annual State of the …
![Fuzz CLI](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/22131547/fuzz_cli-fuzz_testing-400x200.jpg)
CI Fuzz CLI: Open-source tool simplifies fuzz testing for C++
Fuzz testing helps developers protect their applications against memory corruptions, crashes that cause downtime, and other security issues, including DoS and uncaught …
![Wolfi Linux](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/20090833/wolfi-logo_hns-400x200.jpg)
Wolfi: A Linux undistro with security measures for the software supply chain
Wolfi is a new community Linux undistribution that combines the best aspects of existing container base images with default security measures that will include software …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)