software
Open source worldwide: Critical maintenance gaps exposed
Lineaje recently released a report identifying the US and Russia as the leading generators of open-source projects, with both countries also having the highest numbers of …
Kata Containers: Open-source container runtime, building lightweight VMs
Kata Containers is an open-source project dedicated to creating a secure container runtime that combines the performance and simplicity of containers with the enhanced …
Why software is the key to FI risk management
Risk management is important, but it’s not always exciting. Many risk professionals still rely on spreadsheets and manual methods despite the availability of better options. …
Hottest cybersecurity open-source tools of the month: December 2024
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. SafeLine: …
reconFTW: Open-source reconnaissance automation
reconFTW is an open-source tool that simplifies and automates the reconnaissance process, delivering subdomain enumeration, vulnerability assessment, and gathering …
Service disruptions continue to blindside businesses
Service disruptions remain a critical concern for IT and business executives, with 88% of respondents saying they believe another major incident will occur in the next 12 …
Evilginx: Open-source man-in-the-middle attack framework
Evilginx is an open-source man-in-the-middle attack framework designed to phish login credentials and session cookies, enabling attackers to bypass 2FA safeguards. “Back …
What open source means for cybersecurity
With outdated and inadequately maintained components, along with insecure dependencies, the open-source ecosystem presents numerous risks that could expose organizations to …
Vanir: Open-source security patch validation for Android
Google’s open-source tool Vanir enables Android developers to quickly scan custom platform code for missing or applicable security patches. By automating patch …
Trapster Community: Open-source, low-interaction honeypot
Trapster Community is an open-source, lightweight, low-interaction honeypot designed for deployment within internal networks. It enhances network security by creating a …
FuzzyAI: Open-source tool for automated LLM fuzzing
FuzzyAI is an open-source framework that helps organizations identify and address AI model vulnerabilities in cloud-hosted and in-house AI models, like guardrail bypassing and …
Tackling software vulnerabilities with smarter developer strategies
In this Help Net Security interview, Karl Mattson, CISO at Endor Labs, discusses strategies for enhancing secure software development. Mattson covers how developers can …
Featured news
Resources
Don't miss
- TeamPCP’s attack spree slows, but threat escalates with ransomware pivot
- Critical Fortinet FortiClient EMS bug under active attack (CVE-2026-21643)
- Why risk alone doesn’t get you to yes
- ShipSec Studio brings open-source workflow orchestration to security operations
- Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)