Tag: open-source
-
Ipoque State of Open-Source DPI Report 2024 – DPI-Lösungen 2024: Open-Source vs. Kommerziell
by
in SecurityNews
Tags: open-sourceFirst seen on security-insider.de Jump to article: www.security-insider.de/state-of-open-source-dpi-report-2024-analyse-a-28f40dd735659a136bc0137f19e53f9e/
-
Offsite-Backups mit Open-Source – Backup mit Duplicati an getrennten Standorten
by
in SecurityNewsFirst seen on security-insider.de Jump to article: www.security-insider.de/duplicati-open-source-backup-software-a-72d2d53b787fa4ba794bbec83e9fca03/
-
MISP: Open-source threat intelligence and sharing platform
by
in SecurityNewsMISP is an open-source threat intelligence and sharing platform for collecting, storing, distributing, and sharing cybersecurity indicators and threat… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/08/05/misp-open-source-threat-intelligence-platform/
-
NIST Releases Open Source Platform For AI Security Testing
by
in SecurityNewsFirst seen on packetstormsecurity.com Jump to article: packetstormsecurity.com/news/view/36157/NIST-Releases-Open-Source-Platform-For-AI-Security-Testing.html
-
Open-source project enables Raspberry Pi Bluetooth Wi-Fi network configuration
by
in SecurityNewsRemote.It released its open-source project to enable Raspberry Pi Bluetooth (BLE) Wi-Fi network configuration. The project allows a computer or mobile… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/08/02/raspberry-pi-bluetooth-wi-fi-network-configuration/
-
Targeted PyPi Package Steals Google Cloud Credentials from macOS Devs
by
in SecurityNewsThe campaign is laser-targeted, bucking the trend of spray-and-pray malicious open source packages turning up in code repositories seemingly every oth… First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/targeted-pypi-package-steals-google-cloud-credentials-macos-devs
-
Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
by
in SecurityNews
Tags: open-sourceSecretive is an open-source, user-friendly app designed to store and manage SSH keys within the Secure Enclave. Typically, SSH keys are stored on disk… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/07/31/secretive-app-managing-ssh-keys-secure-enclave/
-
NIST releases open-source platform for AI safety testing
by
in SecurityNewsFirst seen on scmagazine.com Jump to article: www.scmagazine.com/news/nist-releases-open-source-platform-for-ai-safety-testing
-
A $500 Open-Source Tool Lets Anyone Hack Computer Chips With Lasers
by
in SecurityNewsFirst seen on wired.com Jump to article: www.wired.com/story/rayv-lite-laser-chip-hacking-tool/
-
BOINC Missbrauch legitimer Open-Source-Software
by
in SecurityNewsArctic Wolf hat seine neuesten Forschungsergebnisse zu den veröffentlicht, die legitime Software aus dem Berkel… First seen on netzpalaver.de Jump to article: netzpalaver.de/2024/07/25/boinc-missbrauch-legitimer-open-source-software/
-
An Introduction to Cloud Computing for Linux Users
by
in SecurityNewsLinux, the open-source operating system renowned for its stability, security, and customizability, is a major force in cloud computing. Many cloud ser… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/an-introduction-to-cloud-computing-for-linux-users/
-
Cirrus: Open-source Google Cloud forensic collection
by
in SecurityNewsCirrus is an open-source Python-based tool designed to streamline Google Cloud forensic evidence collection. It can streamline environment access and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/07/29/cirrus-open-source-google-cloud-forensic-evidence-collection/
-
RaspAP Flaw Let Hackers Escalate Privileges with Raspberry Pi Devices
by
in SecurityNewsA critical local privilege escalation vulnerability has been discovered in RaspAP, an open-source project designed to transform Raspberry Pi devices i… First seen on gbhackers.com Jump to article: gbhackers.com/raspap-flaw-let-hackers-escalate-privileage/
-
Under-Resourced Maintainers Pose Risk to Africa’s Open Source Push
by
in SecurityNewsMany nations see open source software as a great equalizer, giving the Global South the tools necessary for sustainable development. But recent supply… First seen on darkreading.com Jump to article: www.darkreading.com/application-security/under-resourced-maintainers-pose-risk-to-africas-open-source-push
-
BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
by
in SecurityNewsBIND (Berkeley Internet Name Domain) is an open-source DNS software system with an authoritative server, a recursive resolver, and related utilities. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/07/25/bind-9-20-released-enhanced-dnssec-support/
-
TAG-100: New Threat Actor Uses Open-Source Tools for Widespread Attacks
by
in SecurityNewsUnknown threat actors have been observed leveraging open-source tools as part of a suspected cyber espionage campaign targeting global government and … First seen on thehackernews.com Jump to article: thehackernews.com/2024/07/tag-100-new-threat-actor-uses-open.html
-
Making Sense of Open-Source Vulnerability Databases: NVD, OSV, and more
by
in SecurityNewsEssential reading for developers and security professionals alike: a comprehensive comparison of vulnerability databases to help you cut through the n… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/making-sense-of-open-source-vulnerability-databases-nvd-osv-and-more/
-
A Guide to Open Source Software
by
in SecurityNewsFirst seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/a-guide-to-open-source-software/
-
Infisical: Open-source secret management platform
by
in SecurityNewsInfisical is an open-source secret management platform developers use to centralize application configurations and secrets, such as API keys and datab… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/07/24/infisical-open-source-secret-management-platform/
-
SocGholish malware used to spread AsyncRAT malware
by
in SecurityNewsThe JavaScript downloader SocGholish (aka FakeUpdates) is being used to deliver the AsyncRAT and the legitimate open-source project BOINC. Huntress re… First seen on securityaffairs.com Jump to article: securityaffairs.com/166030/malware/socgholish-used-deliver-asyncrat.html
-
Vulnerabilities in LangChain Gen AI Could Prompt Data Leak
by
in SecurityNewsOpen-Source Company Issues Patches After Being Alerted by Palo Alto. A widely used generative artificial intelligence framework is vulnerable to a pro… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/vulnerabilities-in-langchain-gen-ai-could-prompt-data-leak-a-25844
-
SSH-Snake Tool Used in Data Exfiltration Attacks
by
in SecurityNewsA new threat actor is finding success in relying on open-source software (OSS) security tools and a networking mapping tool called SSH-Snake in its ca… First seen on duo.com Jump to article: duo.com/decipher/ssh-snake-tool-used-in-data-exfiltration-attacks
-
Critical Exim Vulnerability Threatens Millions of Email Servers
by
in SecurityNewsExim is a widely used, open-source mail transfer agent (MTA) for Unix and Unix-like operating systems. A critical vulnerability has been discovered in… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/critical-exim-vulnerability-threatens-millions-of-email-servers/
-
CRYSTALRAY Hackers Infect Over 1,500 Victims Using Network Mapping Tool
by
in SecurityNewsA threat actor that was previously observed using an open-source network mapping tool has greatly expanded their operations to infect over 1,500 victi… First seen on thehackernews.com Jump to article: thehackernews.com/2024/07/crystalray-hackers-infect-over-1500.html
-
Shuffle Automation: Open-source security automation platform
by
in SecurityNewsShuffle is an open-source automation platform designed by and for security professionals. While security operations are inherently complex, Shuffle si… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/07/22/shuffle-automation-open-source-security-automation-platform/
-
TAG-100’s Global Espionage Campaign: Exploiting Open-Source Tools
by
in SecurityNewsA newly identified cyberespionage group, dubbed TAG-100 by cybersecurity firm Recorded Future, has been linked to a series of sophisticated attacks ta… First seen on securityonline.info Jump to article: securityonline.info/tag-100s-global-espionage-campaign-exploiting-open-source-tools/
-
TAG-100 Actors Using Open-Source Tools To Attack Gov Private Orgs
by
in SecurityNewsHackers exploit open-source tools to execute attacks because they are readily available, well-documented, and often have extensive community support, … First seen on gbhackers.com Jump to article: gbhackers.com/tag-100-open-source-cyber-attacks/
-
Two of Wallarm’s Open-source Tools Have Been Accepted into Black Hat Arsenal 2024
by
in SecurityNewsWe’re gearing up with some seriously cool stuff for Black Hat! But first, a little sneak peek – not just one, but TWO of Wallarm’s open-source tools w… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/two-of-wallarms-open-source-tools-have-been-accepted-into-black-hat-arsenal-2024/
-
Grype: Open-source vulnerability scanner for container images, filesystems
by
in SecurityNewsGrype is an open-source vulnerability scanner designed for container images and filesystems that seamlessly integrates with Syft, a powerful Software … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/07/18/grype-open-source-vulnerability-scanner-container-images-filesystems/
-
Ollama drama as ‘easyexploit’ critical flaw found in open source AI server
by
in SecurityNewsFirst seen on theregister.com Jump to article: www.theregister.com/2024/06/24/rce_ollama_wiz/