5 Compelling Reasons Not to Manage Your Own VoIP Server

Discover why managing your own VoIP server can be costly, dangerous, and time-consuming for most businesses. Read more »

HackerOne: Nearly Half of Security Professionals Believe AI Is Risky

The Hacker-Powered Security Report showed mixed feelings toward AI in the security community, with many seeing leaked training data as a threat. Read more »

CrowdSec: Open-source security solution offering crowdsourced protection

Crowdsec is an open-source solution that offers crowdsourced protection against malicious IPs. CrowdSec features For this project, the developers have two objectives: Provide free top-quality intrusion detection and protection... Read more »

Detecting vulnerable code in software dependencies is more complex than it seems

In this Help Net Security interview, Henrik Plate, CISSP, security researcher, Endor Labs, discusses the complexities AppSec teams face in identifying vulnerabilities within software dependencies. Plate also discusses the... Read more »

EchoStrike: Generate undetectable reverse shells, perform process injection

EchoStrike is an open-source tool designed to generate undetectable reverse shells and execute process injection on Windows systems. “EchoStrike allows you to generate binaries that, when executed, create an... Read more »

Compliance frameworks and GenAI: The Wild West of security standards

In this Help Net Security interview, Kristian Kamber, CEO at SplxAI, discusses how security challenges for GenAI differ from traditional software. Unlike predictable software, GenAI introduces dynamic, evolving threats,... Read more »

Three Quarters of Dependency Vulnerability Patches Lead to Breakages, Report Finds

Minor updates break clients 94% of the time, while version upgrades cause issues 95% of the time, according to Endor Labs researchers. Read more »

VirtualBox 7.1: This is a major update, here’s what’s new

VirtualBox is a full virtualizer for x86 hardware designed for servers, desktops, and embedded systems. VirtualBox 7.1 introduces an enhanced user interface, cloud VM management, ARM support, Wayland compatibility,... Read more »

DockerSpy: Search for images on Docker Hub, extract sensitive information

DockerSpy scans Docker Hub for images and retrieves sensitive information, including authentication secrets, private keys, and other confidential data. “DockerSpy was created to address the growing concern of sensitive... Read more »

Patch Tuesday for September 2024: Microsoft Catches Four Zero-Day Vulnerabilities

A Mark of the Web security alert vulnerability and three others have been exploited in the wild and are now covered by Redmond’s monthly patch batch. Read more »
Subscribe to our Newsletter