Remove foss-software
article thumbnail

What Is FOSS Software? Definition, Usage, and Vulnerabilities

Heimadal Security

Free Open-Source Software (FOSS) is a software category that incorporates computer programs that are freely licensed and open-source. In essence, FOSS software is free to download, use, modify or study. The post What Is FOSS Software?

article thumbnail

An Unpatched Flaw Existing in Linux Pling Store Apps Might Lead to Supply-Chain Attacks

Heimadal Security

The newly discovered unpatched vulnerability in Linux Pling is affecting Pling-based free and open-source software (FOSS) marketplaces for the Linux platform and has the potential to be abused in order to stage supply-chain attacks and achieve remote code execution (RCE).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Introducing BloodHound 4.2?—?The Azure Refactor

Security Boulevard

The introduction of post-processing in FOSS BloodHound. You can read more about the property in Dirk-jan’s fantastic blog post. This edge is also the product of a new feature in BloodHound FOSS called post-processing, which you can read about further down in this blog post. 12 new and/or improved abuse edges.

article thumbnail

Kali Linux 2024.1 Release (Micro Mirror)

Kali Linux

Introducing the Micro Mirror Free Software CDN With this latest release of Kali Linux, our network of community mirrors grew much stronger, thanks to the help of the Micro Mirror CDN! Last month we replied to a long-forgotten email from Kenneth Finnegan from the FCIX Software Mirror. The summary of the changelog since the 2023.4

Software 145
article thumbnail

Kali Linux 2023.4 Release (Cloud ARM64, Vagrant Hyper-V & Raspberry Pi 5)

Kali Linux

The first thing we can say is that, with Mirrorbits, we find ourselves lucky: this is a rock-solid piece of software, built on modern tech (Go and Redis), initially released 10 years ago, and running in production for just as long. Much more could be written on the topic, and we plan a longer blog post dedicated to it.

article thumbnail

Establish security boundaries in your on-prem AD and Azure environment

Security Boulevard

This blog post provides a high-level explanation of how to implement security boundaries in an on-prem AD and Azure environment to protect your critical assets based on the principle of tiered administration, including how BloodHound Enterprise can help you in the process. Teal has a blog post on PAW available here.