Back to blog

Open source security

What is Log4Shell (the Log4j vulnerability)?

Log4j, Log4j, Log4j. Let’s see you say that 10 times fast. If you can’t, then you may need to learn because Log4j is on the tips

Top 12 AWS Security Tools You Should Know

Amazon Web Services (AWS) provides a large suite of security tools to protect workloads, data, and applications running on AWS cloud infrastructure. Among the 25 AWS-native

Misconfigured Kafdrop Puts Companies’ Apache Kafka Completely Exposed

This research refers to exposed data of organizations or individuals as a result of misconfigured infrastructure, not caused by the Kafdrop project itself. Highly committed to the

Top 7 PHP Security Issues And Vulnerabilities

78.9% of all the websites whose server-side programming language we know are powered by PHP behind the scenes. Without

8 proven strategies to protect your code from data leaks

8 Proven Strategies To Protect Your Code From Data Leaks

Dealing with data leaks after they happen can be a pain. Not only are you tasked with trying to figure out where things went wrong, but

Remediating secrets in code with Teller

Remediating secrets in code with Teller

Teller is a free and open source secret management hub for all your key store and vault needs. With Teller, you can fetch and populate secrets

3 Weeks into the GitHub CoPilot secrets leak – What have we learned

Artificial intelligence has long been heralded as the solution to all our problems: “Don’t worry about it – let the computers do the worrying for you”.

How to fix secrets drift with Teller

Teller is an open-source secrets management tool for developers built in Go. It helps you manage, protect, and fix problems in your code and security posture

7 Tips to Securely Open Source Your Internal Software

Researchers forecast that, over the next few years, open-source code will reach an annual growth rate of more than 25 percent. With cost savings and increased

Stop leaks at the source!