Please turn on your JavaScript for this page to function normally.
Ghostwriter
Ghostwriter: Open-source project management platform for pentesters

In this Help Net Security video, Christopher Maddalena, Director of Internal and Community Product at SpecterOps, showcases Ghostwriter, which helps you manage clients, …

Support
Protecting organizations by understanding end-of-life software risks

CloudSphere recently released the results of its EOL Management and Risk for IT Assets survey, which reveals the level of confidence individuals have regarding which …

open source security
What closed-source software developers can learn from their open-source counterparts

Open-source software has reached greater levels of security than ever before, but its increased adoption comes with new challenges. In this Help Net Security video, Josep …

cert-manager
cert-manager: Automatically provision and manage TLS certificates in Kubernetes

cert-manager adds certificates and certificate issuers as resource types in Kubernetes clusters and simplifies the process of obtaining, renewing, and using those …

open source
Consumer behaviors are the root of open source risk

Sonatype unveiled its eighth annual State of the Software Supply Chain Report which, in addition to a massive surge in open source supply, demand, and malicious attacks, found …

ImmuniWeb Discovery
Product showcase: ImmuniWeb Discovery – attack surface management with dark web monitoring

Organizations around the globe struggle to identify their IT assets hosted in a multicloud environment, on premise or managed by numerous third parties. The lack of visibility …

Tails
Secure portable operating system Tails 5.5 released

Tails, based on Debian GNU/Linux, is a portable operating system that protects against surveillance and censorship, and version 5.5 is now available for download. When …

Scribe Security
Product showcase: Scribe platform’s end-to-end software supply chain security

As software supply chain security becomes more and more crucial, security, DevSecOps, and DevOps teams are more challenged than ever to build transparent trust in the software …

RedEye
CISA releases RedEye open-source analytic tool

CISA has released RedEye, an interactive open-source analytic tool to visualize and report Red Team command and control activities. RedEye, available on GitHub, allows an …

open source
New security concerns for the open-source software supply chain

Open-source software is a critical element of the software supply chain in companies of all sizes, but there are new security concerns for the open-source software supply …

Introduction to Kali Linux
An introduction to Kali Linux

Kali Linux is a specialized Linux distribution developed by Offensive Security, designed for experienced Linux users who need a customized platform for penetration testing. …

vm2 vunerability
Critical vm2 sandbox escape flaw uncovered, patch ASAP! (CVE-2022-36067)

Oxeye researchers discovered a severe vm2 vulnerability (CVE-2022-36067) that has received the maximum CVSS score of 10.0. Called SandBreak, this new vulnerability requires …

Don't miss

Cybersecurity news