software
![software](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19151905/software-dev-400x200.jpg)
Key drivers of software security for financial services
Nearly 72% of applications in the financial services sector contain security flaws, according to Veracode. Despite the alarming figure, this rate of software vulnerability was …
![Tails](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/19082014/tails-os-400x200.jpg)
Tails 5.2.0 comes with several improvements, updated Tor Browser
Tails is a portable operating system that protects against surveillance and censorship. Tails can be installed on any USB stick with a minimum of 8 GB. Tails works on most …
![New ESET Home Antivirus](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/27080834/new-eset-home-antivirus-1400-400x200.jpg)
Product showcase: New ESET Home Security
ESET is thrilled to announce our new cutting-edge consumer solutions. Our consumer offering is more than just security – it is a comprehensive portfolio designed to keep our …
![AWS Kill Switch](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/23120354/aws_kill_switch2-400x200.jpg)
AWS Kill Switch: Open-source incident response tool
AWS Kill Switch is an open-source incident response tool for quickly locking down AWS accounts and IAM roles during a security incident. The solution includes a Lambda …
![software](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19151859/software-dev2-400x200.jpg)
Why it’s the perfect time to reflect on your software update policy
The threat landscape is evolving by the minute, with both malicious actors and well-intentioned researchers constantly on the hunt for new attack vectors that bypass security …
![Best EDR of the market](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/19182157/best_edr_of_the_market-1400-400x200.jpg)
Open-source AV/EDR bypassing lab for training and learning
Best EDR Of The Market is a user-mode endpoint detection and response (EDR) project designed to serve as a testing ground for understanding and bypassing EDR’s user-mode …
![FreeBSD](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/21145620/freebsd-logo-400x200.jpg)
FreeBSD 14.0 released, OpenSSH and OpenSSL updated
FreeBSD 14.0 is now available for the amd64, aarch64, i386, powerpc, powerpc64, powerpc64le, powerpcspe, armv7, and riscv64 architectures. FreeBSD provides sophisticated …
![PolarDNS](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/17105116/polardns-400x200.jpg)
PolarDNS: Open-source DNS server tailored for security evaluations
PolarDNS is a specialized authoritative DNS server that allows the operator to produce custom DNS responses suitable for DNS protocol testing purposes. What can you do with …
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/12091424/vulnerability-broken-400x200.jpg)
Organizations’ serious commitment to software risk management pays off
There has been a significant decrease in vulnerabilities found in target applications – from 97% in 2020 to 83% in 2022 – an encouraging sign that code reviews, automated …
![Wireshark](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/17091650/wireshark-2023-400x200.jpg)
Wireshark 4.2.0 released, open-source packet analysis gets even better
Wireshark, the popular network protocol analyzer, has reached version 4.2.0. Wireshark 4.2.0: Notable changes Wireshark supports dark mode on Windows. Packet list sorting has …
![HARmor](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/14185952/harmor-hns-400x200.jpg)
HARmor: Open-source tool for sanitizing and securing HAR files
HARmor is an open-source tool that sanitizes HTTP Archive files. Easy to install and run, it enables the safe handling and sharing of HAR files. What are HAR files? HAR files …
![Trivy](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/06152313/aqua-trivy-1400-400x200.jpg)
Aqua Trivy open-source security scanner now finds Kubernetes security risks
The Aqua Trivy open-source scanner now supports vulnerability scanning for Kubernetes components and Kubernetes Bill of Materials (KBOM) generation. Now, companies can better …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD