TruffleHog: Open-source solution for scanning secrets

TruffleHog is an open-source scanner that identifies and addresses exposed secrets throughout your entire technology stack. “TruffleHog was originally a research tool I independently authored in 2016. When I published it, no tools were scanning G… Continue reading TruffleHog: Open-source solution for scanning secrets

Custom rules in security tools can be a game changer for vulnerability detection

In this Help Net interview, Isaac Evans, CEO at Semgrep, discusses the balance between speed and thoroughness in CI/CD pipeline security scanning. Stressing the need to avoid slowing down the process, he recommends a nuanced approach, utilizing custom … Continue reading Custom rules in security tools can be a game changer for vulnerability detection

Nemesis: Open-source offensive data enrichment and analytic pipeline

Nemesis is a centralized data processing platform that ingests, enriches, and performs analytics on offensive security assessment data (i.e., data collected during penetration tests and red team engagements).​​ Nemesis was created by Lee Chagolla-Chris… Continue reading Nemesis: Open-source offensive data enrichment and analytic pipeline

Kubescape open-source project adds Vulnerability Exploitability eXchange (VEX) support

With its innovative feature for generating reliable Vulnerability Exploitability eXchange (VEX) documents, Kubescape became the first open-source project to provide this functionality. This advancement offers security practitioners a powerful tool to e… Continue reading Kubescape open-source project adds Vulnerability Exploitability eXchange (VEX) support

Aqua Trivy open-source security scanner now finds Kubernetes security risks

The Aqua Trivy open-source scanner now supports vulnerability scanning for Kubernetes components and Kubernetes Bill of Materials (KBOM) generation. Now, companies can better understand the components within their Kubernetes environment and how secure … Continue reading Aqua Trivy open-source security scanner now finds Kubernetes security risks

Raven: Open-source CI/CD pipeline security scanner

Raven (Risk Analysis and Vulnerability Enumeration for CI/CD) is an open-source CI/CD pipeline security scanner that makes hidden risks visible by connecting the dots across vulnerabilities woven throughout the pipeline that, when viewed collectively, … Continue reading Raven: Open-source CI/CD pipeline security scanner

Google Play Protect takes on malicious apps with code-level scanning

Google is enhancing Google Play Protect’s real-time scanning to include code-level scanning, to keep Android devices safe from malicious and unwanted apps, especially those downloaded (or sideloaded) from outside of the Google Play app store &#82… Continue reading Google Play Protect takes on malicious apps with code-level scanning

5 free vulnerability scanners you should check out

Vulnerability scanners delve into systems to uncover security gaps. The primary mission? To fortify organizations against breaches and shield sensitive data from exposure. Beyond merely pinpointing weaknesses, vulnerability scanning is a proactive meas… Continue reading 5 free vulnerability scanners you should check out

Colorpik Pen draws from its surroundings to draw in 16 million colors

With regular felt pens, users are limited to the colors of the pens in a set. As you might have guessed, though, the Colorpik Pen is different – it can reproduce 16 million colors, which are scanned from the user’s environment.Continue ReadingCategory:… Continue reading Colorpik Pen draws from its surroundings to draw in 16 million colors