software

Rayhunter: EFF releases open-source tool to detect cellular spying

Rayhunter: EFF releases open-source tool to detect cellular spying 2025-09-17 at 08:12 By Anamarija Pogorelec The Electronic Frontier Foundation (EFF) has released Rayhunter, a new open-source tool designed to detect cell site simulators (CSS). These devices, also known as IMSI catchers or Stingrays, mimic cell towers to trick phones into connecting so they can collect […]

React to this headline:

Loading spinner

Rayhunter: EFF releases open-source tool to detect cellular spying Read More »

Product showcase: Clean Links exposes what’s hiding behind a QR code

Product showcase: Clean Links exposes what’s hiding behind a QR code 2025-09-16 at 08:40 By Anamarija Pogorelec Clean Links is a handy app that shows you exactly where a link will take you before you click it. It strips out trackers, expands shortened URLs, and helps you avoid scams while saving you time and frustration.

React to this headline:

Loading spinner

Product showcase: Clean Links exposes what’s hiding behind a QR code Read More »

Garak: Open-source LLM vulnerability scanner

Garak: Open-source LLM vulnerability scanner 2025-09-10 at 09:00 By Help Net Security LLMs can make mistakes, leak data, or be tricked into doing things they were not meant to do. Garak is a free, open-source tool designed to test these weaknesses. It checks for problems like hallucinations, prompt injections, jailbreaks, and toxic outputs. By running

React to this headline:

Loading spinner

Garak: Open-source LLM vulnerability scanner Read More »

Signal adds secure backup option for chat history

Signal adds secure backup option for chat history 2025-09-09 at 10:52 By Anamarija Pogorelec Losing a phone can mean losing years of conversations. Signal is rolling out a new secure backup feature to help users keep their messages safe without giving up privacy. The problem with lost chats Signal has long avoided cloud backups because

React to this headline:

Loading spinner

Signal adds secure backup option for chat history Read More »

Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader support

Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader support 2025-09-08 at 09:52 By Sinisa Markovic The Linux Kernel Runtime Guard (LKRG) is a kernel module that checks the Linux kernel while it’s running. It looks for signs of tampering and tries to catch attempts to exploit security flaws in the kernel. Because

React to this headline:

Loading spinner

Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader support Read More »

InterceptSuite: Open-source network traffic interception tool

InterceptSuite: Open-source network traffic interception tool 2025-09-08 at 08:34 By Mirko Zorz InterceptSuite is an open-source, cross-platform network traffic interception tool designed for TLS/SSL inspection, analysis, and manipulation at the network level. “InterceptSuite is designed primarily for non-HTTP protocols, although it does support HTTP/1 and HTTP/2. It offers support for databases, SMTP, and custom protocols,

React to this headline:

Loading spinner

InterceptSuite: Open-source network traffic interception tool Read More »

How to Close the AI Governance Gap in Software Development

How to Close the AI Governance Gap in Software Development 2025-09-05 at 18:14 By Matias Madou Widespread adoption of AI coding tools accelerates development—but also introduces critical vulnerabilities that demand stronger governance and oversight. The post How to Close the AI Governance Gap in Software Development appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

How to Close the AI Governance Gap in Software Development Read More »

BruteForceAI: Free AI-powered login brute force tool

BruteForceAI: Free AI-powered login brute force tool 2025-09-03 at 09:31 By Help Net Security BruteForceAI is a penetration testing tool that uses LLMs to improve the way brute-force attacks are carried out. Instead of relying on manual setup, the tool can analyze HTML content, detect login form selectors, and prepare the attack process automatically. It

React to this headline:

Loading spinner

BruteForceAI: Free AI-powered login brute force tool Read More »

Hottest cybersecurity open-source tools of the month: August 2025

Hottest cybersecurity open-source tools of the month: August 2025 2025-08-27 at 08:02 By Sinisa Markovic This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Buttercup: Open-source AI-driven system detects and patches vulnerabilities Buttercup is a free, automated, AI-powered platform that finds and fixes vulnerabilities in open-source

React to this headline:

Loading spinner

Hottest cybersecurity open-source tools of the month: August 2025 Read More »

Kopia: Open-source encrypted backup tool for Windows, macOS, Linux

Kopia: Open-source encrypted backup tool for Windows, macOS, Linux 2025-08-25 at 08:21 By Help Net Security Kopia is an open-source backup and restore tool that lets you create encrypted snapshots of your files and store them in cloud storage, on a remote server, on network-attached storage, or on your own computer. It doesn’t create a

React to this headline:

Loading spinner

Kopia: Open-source encrypted backup tool for Windows, macOS, Linux Read More »

The 6 challenges your business will face in implementing MLSecOps

The 6 challenges your business will face in implementing MLSecOps 2025-08-20 at 09:04 By Help Net Security Organizations that don’t adapt their security programs as they implement AI run the risk of being exposed to a variety of threats, both old and emerging ones. MLSecOps addresses this critical gap in security perimeters by combining AI

React to this headline:

Loading spinner

The 6 challenges your business will face in implementing MLSecOps Read More »

LudusHound: Open-source tool brings BloodHound data to life

LudusHound: Open-source tool brings BloodHound data to life 2025-08-20 at 08:31 By Mirko Zorz LudusHound is an open-source tool that takes BloodHound data and uses it to set up a working Ludus Range for safe testing. It creates a copy of an Active Directory environment using previously gathered BloodHound data. Red teams can use this

React to this headline:

Loading spinner

LudusHound: Open-source tool brings BloodHound data to life Read More »

Buttercup: Open-source AI-driven system detects and patches vulnerabilities

Buttercup: Open-source AI-driven system detects and patches vulnerabilities 2025-08-18 at 09:42 By Help Net Security Buttercup is a free, automated, AI-powered platform that finds and fixes vulnerabilities in open-source software. Developed by Trail of Bits, it recently earned second place in DARPA’s AI Cyber Challenge (AIxCC). Main components Buttercup is made up of four main

React to this headline:

Loading spinner

Buttercup: Open-source AI-driven system detects and patches vulnerabilities Read More »

Obot MCP Gateway: Open-source platform to securely manage the adoption of MCP servers

Obot MCP Gateway: Open-source platform to securely manage the adoption of MCP servers 2025-08-15 at 08:34 By Help Net Security Obot MCP Gateway is a free, open-source gateway that enables IT organizations to securely manage and scale adoption of Model Context Protocol (MCP) servers. MCPs are becoming the standard for how AI agents interface with

React to this headline:

Loading spinner

Obot MCP Gateway: Open-source platform to securely manage the adoption of MCP servers Read More »

Open-source flow monitoring with SENSOR: Benefits and trade-offs

Open-source flow monitoring with SENSOR: Benefits and trade-offs 2025-08-14 at 09:16 By Mirko Zorz Flow monitoring tools are useful for tracking traffic patterns, planning capacity, and spotting threats. But many off-the-shelf solutions come with steep licensing costs and hardware demands, especially if you want to process every packet. A research team at the University of

React to this headline:

Loading spinner

Open-source flow monitoring with SENSOR: Benefits and trade-offs Read More »

EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations

EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations 2025-08-12 at 08:01 By Help Net Security EntraGoat is a purpose-built tool that sets up a vulnerable Microsoft Entra ID environment to mimic real-world identity security issues. It’s designed to help security professionals practice spotting and exploiting common misconfigurations. The tool creates a range

React to this headline:

Loading spinner

EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations Read More »

WinRAR zero day exploited by RomCom hackers in targeted attacks

WinRAR zero day exploited by RomCom hackers in targeted attacks 2025-08-11 at 12:55 By Sinisa Markovic ESET researchers have discovered a previously unknown vulnerability in WinRAR, exploited in the wild by Russia-aligned group RomCom. If you use WinRAR or related components such as the Windows versions of its command line tools, UnRAR.dll, or the portable

React to this headline:

Loading spinner

WinRAR zero day exploited by RomCom hackers in targeted attacks Read More »

Open-source server management platform Proxmox VE 9.0 released

Open-source server management platform Proxmox VE 9.0 released 2025-08-06 at 16:17 By Help Net Security Proxmox Virtual Environment (VE) 9.0 introduces advancements in both storage and networking capabilities, addressing critical enterprise demands. A highlight is the long-awaited support for snapshots on thick-provisioned LVM shared storage, improving storage management capabilities especially for enterprise users with Fibre

React to this headline:

Loading spinner

Open-source server management platform Proxmox VE 9.0 released Read More »

Vibe Coding: When Everyone’s a Developer, Who Secures the Code?

Vibe Coding: When Everyone’s a Developer, Who Secures the Code? 2025-08-05 at 16:42 By Kevin Townsend As AI makes software development accessible to all, security teams face a new challenge: protecting applications built by non-developers at unprecedented speed and scale. The post Vibe Coding: When Everyone’s a Developer, Who Secures the Code? appeared first on

React to this headline:

Loading spinner

Vibe Coding: When Everyone’s a Developer, Who Secures the Code? Read More »

BloodHound 8.0 debuts with major upgrades in attack path management

BloodHound 8.0 debuts with major upgrades in attack path management 2025-08-05 at 10:11 By Help Net Security SpecterOps has released BloodHound 8.0, the latest iteration of its open-source attack path management platform, featuring major enhancements and expanded capabilities. BloodHound OpenGraph The release introduces BloodHound OpenGraph, a major advancement in identity attack path management that uncovers

React to this headline:

Loading spinner

BloodHound 8.0 debuts with major upgrades in attack path management Read More »

Scroll to Top