Tag: open-source
-
Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets
Trivy, a popular open-source vulnerability scanner maintained by Aqua Security, was compromised a second time within the span of a month to deliver malware that stole sensitive CI/CD secrets.The latest incident impacted GitHub Actions “aquasecurity/trivy-action” and “aquasecurity/setup-trivy,” which are used to scan Docker container images for vulnerabilities and set up GitHub Actions workflow First seen…
-
Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets
Trivy, a popular open-source vulnerability scanner maintained by Aqua Security, was compromised a second time within the span of a month to deliver malware that stole sensitive CI/CD secrets.The latest incident impacted GitHub Actions “aquasecurity/trivy-action” and “aquasecurity/setup-trivy,” which are used to scan Docker container images for vulnerabilities and set up GitHub Actions workflow First seen…
-
6 Best Open Source Password Managers for Windows in 2026
Discover the top open-source password managers for Windows. Learn about the features and benefits of each to determine which one is the best fit for your needs. The post 6 Best Open Source Password Managers for Windows in 2026 appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/best-password-manager-open-source-windows/
-
SpecterOps erweitert Identity Attack Path Management auf Okta, GitHub und Mac
SpecterOps entwickelt und pflegt weit verbreitete Open-Source-Sicherheitstools, allen voran BloodHound das Tool für effektives Identity Attack Path Management. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/specterops-erweitert-identity-attack-path-management-auf-okta-github-und-mac/a44204/
-
New ‘PolyShell’ flaw allows unauthenticated RCE on Magento e-stores
A newly disclosed vulnerability dubbed ‘PolyShell’ affects all Magento Open Source and Adobe Commerce stable version 2 installations, allowing unauthenticated code execution and account takeover. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-polyshell-flaw-allows-unauthenticated-rce-on-magento-e-stores/
-
The Hidden Security Risks in Open-Source Dependencies Nobody Talks About
Open-source dependencies introduce hidden risks, from transitive vulnerabilities to supply chain attacks. Learn how to reduce exposure. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/the-hidden-security-risks-in-open-source-dependencies-nobody-talks-about/
-
The Hidden Security Risks in Open-Source Dependencies Nobody Talks About
Open-source dependencies introduce hidden risks, from transitive vulnerabilities to supply chain attacks. Learn how to reduce exposure. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/the-hidden-security-risks-in-open-source-dependencies-nobody-talks-about/
-
Betterleaks: Open-source secrets scanner
Secrets scanning has become standard practice across engineering organizations, and Gitleaks has been one of the most widely used tools in that space. The author of that … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/19/betterleaks-open-source-secrets-scanner/
-
Transparent COM instrumentation for malware analysis
In this article, Cisco Talos presents DispatchLogger, a new open-source tool that delivers high visibility into late-bound IDispatch COM object interactions via transparent proxy interception. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/transparent-com-instrumentation-for-malware-analysis/
-
Open Source und KI: Fördergelder allein werden das Problem nicht lösen
Open-Source-Entwickler sind durch KI-Meldungen massiv überlastet. Die Linux Foundation und Tech-Unternehmen kündigen nun Hilfe an. First seen on golem.de Jump to article: www.golem.de/news/open-source-und-ki-foerdergelder-allein-werden-das-problem-nicht-loesen-2603-206636.html
-
Big tech companies step in to support the open source security ecosystem
The Linux Foundation announced $12.5 million in grant funding backed by Anthropic, AWS, GitHub, Google, Google DeepMind, Microsoft, and OpenAI to strengthen open source … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/18/linux-foundation-open-source-security-12-5-million-funding/
-
Nvidia NemoClaw promises to run OpenClaw agents securely
Hardware agnostic: For enterprises wary of lock-in, the first question they will ask is what Nvidia gains from NemoClaw. NemoClaw’s OpenShell is fully open source, an attempt to turn it into the gold standard for agentic claw security.The underlying hardware is not vendor specific either; NemoClaw is agnostic and will run on any hardware, not…
-
6 Open-Source Vulnerability Scanners That Actually Work in 2026
Compare top open-source vulnerability scanners and their key features. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/networks/open-source-vulnerability-scanners/
-
LeakNet ransomware uses ClickFix, Deno runtime in stealthy attacks
The LeakNet ransomware gang is now using the ClickFix technique for initial access into corporate environments and deploys a malware loader based on the open-source Deno runtime for JavaScript and TypeScript. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/leaknet-ransomware-uses-clickfix-and-deno-runtime-for-stealthy-attacks/
-
Microsoft Launches AI-Driven Troubleshooting for Purview Data Lifecycle Tools
Microsoft has officially released a new open-source tool designed to simplify how IT and security administrators manage data governance. Announced on March 16, 2026, the DLM Diagnostics Model Context Protocol (MCP) Server brings artificial intelligence directly into the troubleshooting process for Microsoft Purview Data Lifecycle Management (DLM). Managing data lifecycles across Microsoft 365 workloads is…
-
Microsoft Launches AI-Driven Troubleshooting for Purview Data Lifecycle Tools
Microsoft has officially released a new open-source tool designed to simplify how IT and security administrators manage data governance. Announced on March 16, 2026, the DLM Diagnostics Model Context Protocol (MCP) Server brings artificial intelligence directly into the troubleshooting process for Microsoft Purview Data Lifecycle Management (DLM). Managing data lifecycles across Microsoft 365 workloads is…
-
CrowdStrike Extends Agentic AI Alliance with NVIDIA
CrowdStrike today revealed it is adding additional artificial intelligence (AI) agents into its managed detection and response (MDR) services using a toolkit provided by NVIDIA. At the same time, CrowdStrike also announced that a Secure-by-Design AI Blueprint built in collaboration with NVIDIA will now be incorporated into NVIDIA OpenShell, an open-source runtime for creating sandboxes..…
-
CrowdStrike Extends Agentic AI Alliance with NVIDIA
CrowdStrike today revealed it is adding additional artificial intelligence (AI) agents into its managed detection and response (MDR) services using a toolkit provided by NVIDIA. At the same time, CrowdStrike also announced that a Secure-by-Design AI Blueprint built in collaboration with NVIDIA will now be incorporated into NVIDIA OpenShell, an open-source runtime for creating sandboxes..…
-
PostgreSQL Penetration Testing
PostgreSQL is one of the most popular open-source relational database systems, powering everything from small web applications to enterprise-scale platforms. Its widespread adoption makes it First seen on hackingarticles.in Jump to article: www.hackingarticles.in/penetration-testing-on-postgresql-5432/
-
Betterleaks Launches as Open-Source Tool for Scanning Files, Directories, and Git Repositories
Zach Rice, the original creator of the widely popular secret scanning tool Gitleaks, has officially launched its successor, Betterleaks. Sponsored by Aikido Security, this new open-source project aims to be a faster, smarter, and highly configurable replacement for finding hardcoded secrets in codebases. After losing full administrative control over the original Gitleaks repository, Rice joined…
-
VulHunt: Open-source vulnerability detection framework
Binarly has published VulHunt Community Edition, making the core scanning engine from Binarly’s commercial Transparency Platform available to independent researchers and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/16/vulhunt-open-source-vulnerability-detection-framework/
-
Betterleaks, a new open-source secrets scanner to replace Gitleaks
A new open-source tool called Betterleaks can scan directories, files, and git repositories and identify valid secrets using default or customized rules. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/betterleaks-a-new-open-source-secrets-scanner-to-replace-gitleaks/
-
OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration
China’s National Computer Network Emergency Response Technical Team (CNCERT) has issued a warning about the security stemming from the use of OpenClaw (formerly Clawdbot and Moltbot), an open-source and self-hosted autonomous artificial intelligence (AI) agent.In a post shared on WeChat, CNCERT noted that the platform’s “inherently weak default security configurations,” coupled with its First seen…
-
Mapping the Unknown: Introducing Pius for Organizational Asset Discovery
Asset discovery is an essential part of Praetorian’s service delivery process. When we are engaged to carry out continuous external penetration testing, one key action is to build and maintain a thorough target asset inventory that goes beyond any lists or databases provided by the system owner. Pius is our open-source attack surface mapping tool……
-
DR-DOS rises again rebuilt from scratch, not open source
Project claims legal clarity and zero legacy code, but offers binaries only First seen on theregister.com Jump to article: www.theregister.com/2026/03/11/drdos_9/
-
ENISA Technical Advisory on Secure Package Managers: Essential DevSecOps Guidance
ENISA’s first Technical Advisory on Secure Package Managers helps developers safely use third-party packages. ENISA has released its first Technical Advisory on Package Managers, focusing on how developers can safely consume third-party packages. The document (March 2026, v1.1) follows public feedback incorporating 15 contributions from stakeholders, experts, and the open-source community. >>This document focuses on…
-
Salesforce tracks possible ShinyHunters campaign targeting its users
Salesforce warns users of an uptick in malicious activity targeting Experience Cloud customers with misconfigured user settings via an open source tool First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639851/Salesforce-tracks-possible-ShinyHunters-campaign-targeting-its-users
-
Cloud-audit: Fast, open-source AWS security scanner
Running AWS security audits without a dedicated security team typically means choosing between enterprise platforms with per-check billing and generic open-source scanners … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/11/cloud-audit-open-source-aws-security-scanner/
-
APT28 hackers deploy customized variant of Covenant open-source tool
The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/apt28-hackers-deploy-customized-variant-of-covenant-open-source-tool/
-
Gogs Flaw Could Let Attackers Quietly Overwrite Large File Storage Data
Tags: attack, cve, cyber, data, exploit, flaw, open-source, software, supply-chain, threat, vulnerabilityA critical security vulnerability has been identified in Gogs, a widely used open-source self-hosted Git service. / Tracked as CVE-2026-25921, this flaw allows unauthenticated attackers to silently overwrite Git Large File Storage (LFS) objects across any repository. By exploiting a lack of content verification, threat actors can conduct stealthy software supply-chain attacks, replacing legitimate project…

