software
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/29104413/open_source1-400x200.jpg)
Is an open-source AI vulnerability next?
AI has captured widespread interest and offers numerous benefits. However, its rapid advancement and widespread adoption raise concerns, especially for those of us in …
![OWASP dep-scan](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/10120942/owasp_dep-scan-1500-400x200.webp)
OWASP dep-scan: Open-source security and risk audit tool
OWASP dep-scan is an open-source security and risk assessment tool that leverages information on vulnerabilities, advisories, and licensing restrictions for project …
![BLint](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/08094431/blint-1500-400x200.webp)
BLint: Open-source tool to check the security properties of your executables
BLint is a Binary Linter designed to evaluate your executables’ security properties and capabilities, utilizing LIEF for its operations. From version 2, BLint can also …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101944/genai2-400x200.jpg)
How AI affects vulnerability management in open-source software
In this Help Net Security video, Itamar Sher, CEO of Seal Security, discusses how AI affects the risk and operational aspects of managing vulnerabilities in open-source …
![Nmap](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/09173702/nmap-1500-400x200.webp)
Nmap 7.95 released: New OS and service detection signatures
Nmap is a free, open-source tool for network discovery and security auditing. It’s valued by systems and network administrators for network inventory, managing service …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/07145807/iot-1500-400x200.webp)
Regulators are coming for IoT device security
Cybersecurity is a relatively new challenge for many IoT device makers who have traditionally produced non-connected devices. These devices were less vulnerable to …
![pktstat](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/07142145/pktstat-400x200.webp)
Pktstat: Open-source ethernet interface traffic monitor
Pktstat is an open-source tool that is a straightforward alternative to ncurses-based Pktstat. On Linux, it utilizes AF_PACKET, while on other platforms, it employs generic …
![reNgine](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/20130638/rengine-1500-400x200.webp)
reNgine: Open-source automated reconnaissance framework for web applications
reNgine is an open-source automated reconnaissance framework for web applications that focuses on a highly configurable and streamlined recon process. Developing reNgine …
![Tracecat](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/16055521/tracecat-1500-400x200.webp)
Tracecat: Open-source SOAR
Tracecat is an open-source automation platform for security teams. The developers believe security automation should be accessible to everyone, especially understaffed small- …
![Pathfinder](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/29112839/pathfinder-1500-400x200.webp)
Researchers unveil novel attack methods targeting Intel’s conditional branch predictor
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise …
![Prompt Fuzzer](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/21135943/prompt_fuzzer-1500-400x200.webp)
Prompt Fuzzer: Open-source tool for strengthening GenAI apps
Prompt Fuzzer is an open-source tool that evaluates the security of your GenAI application’s system prompt against dynamic LLM-based threats. Prompt Fuzzer features …
![LSA Whisperer](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/18154559/lsa-whisperer-1500-400x200.webp)
LSA Whisperer: Open-source tools for interacting with authentication packages
LSA Whisperer consists of open-source tools designed to interact with authentication packages through their unique messaging protocols. Support is currently provided for the …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders