Millions of Apple Applications Were Vulnerable to CocoaPods Supply Chain Attack

The vulnerabilities have since been patched, but had quietly persisted since the CocoaPods migration in 2014. Read more »

Secator: Open-source pentesting Swiss army knife

Secator is an open-source task and workflow runner tailored for security assessments. It facilitates the use of numerous security tools and aims to enhance the efficiency of pen testers... Read more »

CISA Report Finds Most Open-Source Projects Contain Memory-Unsafe Code

Analysts found that 52% of open-source projects are written in memory-unsafe languages like C and C++. Read more »

Portainer: Open-source Docker and Kubernetes management

Portainer Community Edition is an open-source, lightweight service delivery platform for containerized applications. It enables the management of Docker, Swarm, Kubernetes, and ACI environments. It provides a smart GUI... Read more »

AI Is Changing the Way Enterprises Look at Trust: Deloitte & SAP Weigh In

Generative AI for enterprises can help or hurt. Here’s how to maintain trust in the age of AI. Read more »

Ransomware Cheat Sheet: Everything You Need To Know In 2024

This guide covers various ransomware attacks, including Colonial Pipeline, WannaCry and LockBit, the systems hackers target and how to avoid becoming a victim and paying cybercriminals a ransom. Read more »

Gitleaks: Open-source solution for detecting secrets in your code

Gitleaks is an open-source SAST tool designed to detect and prevent hardcoded secrets such as passwords, API keys, and tokens in Git repositories. With more than 15 million Docker... Read more »

Developer errors lead to long-term exposure of sensitive data in Git repos

Credentials, API tokens, and passkeys – collectively referred to as secrets – from organizations around the globe were exposed for years, according to Aqua Security’s latest research. By scanning... Read more »

Zeek: Open-source network traffic analysis, security monitoring

Zeek is an open-source network analysis framework. Unlike an active security device such as a firewall, Zeek operates on a versatile ‘sensor’ that can be a hardware, software, virtual,... Read more »

Cilium: Open-source eBPF-based networking, security, observability

Cilium is an open-source, cloud-native solution that leverages eBPF technology in the Linux kernel to provide, secure, and monitor network connectivity between workloads. What is eBPF? eBPF is a... Read more »
Subscribe to our Newsletter