CloudLinux releases UChecker security tool for Linux servers

UChecker, an abbreviation for "userspace checker," works with all modern Linux distributions and provides detailed actionable information on which application is using which vulnerable library.

How to use Google's new dependency mapping tool to find security flaws buried in your projects

The experimental dependency exploration tool, dubbed Open Source Insights and available at deps.dev, flags up any unpatched vulnerabilities across millions of open-source software libraries.

Deadshot: Open source DevOps tool stops sensitive data from being uploaded to GitHub

Deadshot monitors GitHub pull requests in real-time. The open-source tool flags the potential inclusion of sensitive data in any code, as well as “changes to sensitive functionality”.

Microsoft: This new open source tool helps you test your defences again hacker attacks

Microsoft has released SimuLand, an open-source project which aims to help security teams reproduce known attack scenarios - and test just how good Microsoft's core security products are.

GlobalPlatform expands TEE certification scheme

GlobalPlatform has expanded its Trusted Execution Environment (TEE) security certification scheme to enable evaluation of discrete technologies that come together to make up a complete TEE solution.

Google Releases Open Source Tool for Verifying Containers

Developed in collaboration with Linux Foundation’s sigstore project, the technology company said the motivation for cosign is “to make signatures invisible infrastructure.”

SniperPhish: An all-in-one open-source phishing toolkit

SniperPhish is an all-in-one open-source phishing toolkit that pentesters and other security professionals can use for setting up and executing email and web-based spear-phishing campaigns.

Microsoft Defender now blocks cryptojacking malware using Intel TDT

Intel TDT couples low-level hardware telemetry collected from the CPU's performance monitoring unit (PMU) with machine learning to detect cryptomining malware at execution time.

Infection Monkey: Open source tool allows zero trust assessment of AWS environments

Using this tool, security professionals can conduct zero trust assessments of AWS environments to help identify the potential gaps in an organization’s AWS security posture that can put data at risk.

Microsoft releases a cyberattack simulator - Shall we play a game?

Microsoft has released an open-source cyberattack simulator that allows security researchers and data scientists to create simulated network environments and see how they fare against AI-controlled cyber agents.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags