software
![Crowdstrike](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/19130702/crowdstrike-2-1500-400x200.webp)
Learning from CrowdStrike’s quality assurance failures
CrowdStrike has released a preliminary Post Incident Review (PIR) of how the flawed Falcon Sensor update made its way to millions of Windows systems and pushed them into a …
![Infisical](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/11091752/infisical-1500-color-400x200.webp)
Infisical: Open-source secret management platform
Infisical is an open-source secret management platform developers use to centralize application configurations and secrets, such as API keys and database credentials, while …
![Anand Pashupathy](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/09123752/anand_pashupathy-2-intel-400x200.webp)
Confidential AI: Enabling secure processing of sensitive data
In this Help Net Security interview, Anand Pashupathy, VP & GM, Security Software & Services Division at Intel, explains how Intel’s approach to confidential …
![Shuffle Automation](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/10135440/shuffle_automation-1500-400x200.webp)
Shuffle Automation: Open-source security automation platform
Shuffle is an open-source automation platform designed by and for security professionals. While security operations are inherently complex, Shuffle simplifies the process. …
![software](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/21083820/software-1500-2-400x200.webp)
One-third of dev professionals unfamiliar with secure coding practices
Attackers consistently discover and exploit software vulnerabilities, highlighting the increasing importance of robust software security, according to OpenSSF and the Linux …
![Grype](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/06152010/grype-scanner-1500-400x200.webp)
Grype: Open-source vulnerability scanner for container images, filesystems
Grype is an open-source vulnerability scanner designed for container images and filesystems that seamlessly integrates with Syft, a powerful Software Bill of Materials (SBOM) …
![SubSnipe](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/07154904/subsnipe-1500-400x200.webp)
SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
SubSnipe is an open-source, multi-threaded tool to help find subdomains vulnerable to takeover. It’s simpler, produces better output, and has more fingerprints than …
![Realm](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/06152013/realm-1500-400x200.webp)
Realm: Open-source adversary emulation framework
Realm is an open-source adversary emulation framework emphasizing scalability, reliability, and automation. It’s designed to handle engagements of any size. “Realm …
![X](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/10171257/x-twitter-1500-400x200.webp)
How AI-powered software spreads Russian disinformation on X
The US Justice Department (DoJ) has seized two US-based domains used by Russian threat actors to create fake profiles on X (formerly Twitter) that would spread disinformation …
![BunkerWeb](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/06152006/bunkerweb-open_source-waf-400x200.webp)
BunkerWeb: Open-source Web Application Firewall (WAF)
BunkerWeb is an open-source Web Application Firewall (WAF) distributed under the AGPLv3 free license. The solution’s core code is entirely auditable by a third party and …
![Monocle](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/01211022/monocle-llm-1500-400x200.webp)
Monocle: Open-source LLM for binary analysis search
Monocle is open-source tooling backed by a large language model (LLM) for performing natural language searches against compiled target binaries. Monocle can be provided with a …
![Secator](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24212032/secator-1500-400x200.webp)
Secator: Open-source pentesting Swiss army knife
Secator is an open-source task and workflow runner tailored for security assessments. It facilitates the use of numerous security tools and aims to enhance the efficiency of …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege