software
![Dependency Combobulator](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/09211442/dependency_combobulator-1200-400x200.jpg)
Dependency Combobulator: Open source toolkit to combat dependency confusion attacks
Apiiro released Dependency Combobulator, a modular and extensible open source toolkit to detect and prevent dependency confusion attacks. The toolkit, available on GitHub, …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092834/industrial-400x200.jpg)
Unseen gatekeepers: Industrial software providers’ role securing global infrastructure
National infrastructure in almost every Western country has come under attack by threat actors in the last few years. These attacks have grabbed the attention of businesses, …
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094911/criminal1-400x200.jpg)
77% of rootkits are used for espionage purposes
In a new report, Positive Technologies analyzes this past decade’s most infamous families of rootkits – programs that hide the presence of malicious software or …
![MITRE ATT&CK](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/15120235/mitre-attack-400x200.jpg)
Mapping ATT&CK techniques to CVEs should make risk assessment easier
Vulnerability reporters should start using MITRE ATT&CK technique references to describe what the attacker is trying to achieve by exploiting a given CVE-numbered …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093906/ai3-400x200.jpg)
Navigating ethics in AI today to avoid regrets tomorrow
As artificial intelligence (AI) programs become more powerful and more common, organizations that use them are feeling pressure to implement ethical practices in the …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095917/bot-400x200.jpg)
Bots to become the future of work and provide ROI to organizations using them
The prolonged pandemic has already brought many changes to the workplace, and according to a TELUS International survey, 90% of U.S. employees believe bots will play a key …
![ThreatMapper](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/11100435/threatmapper-1280-400x200.jpg)
ThreatMapper: Open source platform for scanning runtime environments
Deepfence announced open source availability of ThreatMapper, a signature offering that automatically scans, maps and ranks application vulnerabilities across serverless, …
![KuberLogic](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/12121809/kuberlogic-logo-400x200.jpg)
KuberLogic open-source platform turns infrastructure into a managed PaaS
CloudLinux launched a new open-core project – KuberLogic – software that allows DevOps to set up scalable, self-healing PaaS on top of your Kubernetes cluster. Available on …
![Nick Myers](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/05104201/nick_myers_3-bae_systems-400x200.png)
Electronic warfare: The critical capability of dominating the electromagnetic spectrum
In this interview with Help Net Security, Nick Myers, Director of Business Development, Electronic Combat Solutions at BAE Systems, talks about the evolution of electronic …
![fix](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092943/aid2-400x200.jpg)
ORM software market to reach $2.6 billion in 2026
The global operational risk management (ORM) software applications market will grow from $1.5 billion in 2020, at a CAGR of 9%, to $2.6 billion in 2026, according to a study …
![Bug](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195653/software-762486_1280-400x200.jpg)
Security and trust in software remains top priority for buyers
Faster decision making, credit card transactions instead of negotiated contracts, and the near-ubiquitous use of peer review sites are all part of the new normal in enterprise …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095447/chain1-400x200.jpg)
C-level execs confident in their software supply chain security, but challenges remain
A survey of C-level executives released by CloudBees reveals high confidence levels in software supply chain security but a limited understanding of the essential components …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints