Application Security

11/3/2014
10:00 AM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

10 Cool Security Tools Open-Sourced By The Internet's Biggest Innovators

Google, Facebook, Netflix, and others have all offered up tools they've developed in-house to the community at large.
Previous
1 of 10
Next

As today's Internet giants break the barrier for speed and scale of development of systems, their teams are increasingly tasked with building home-brewed security systems that can help them develop and manage their systems securely without missing a beat. In the end, the entire security community is benefitting from a lot of these investments, as many of these firms make these tools available through open-source projects. Over the past few years, some very useful tools have come from the security and engineering teams at Facebook, Twitter, Google, Netflix, Etsy, and even AOL.

Security Monkey
Built by Netflix three years ago, Security Monkey is a monitoring and security analysis tool for Amazon Web Services configurations. It includes components for monitoring various AWS account components, developing, and executing actions based on policy rules, notifying users when audit rules are triggered and storing configuration histories for forensic and audit purposes.

(Image: Netflix)

Built by Netflix three years ago, Security Monkey is a monitoring and security analysis tool for Amazon Web Services configurations. It includes components for monitoring various AWS account components, developing, and executing actions based on policy rules, notifying users when audit rules are triggered and storing configuration histories for forensic and audit purposes.

(Image: Netflix)

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
1 of 10
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
11/4/2014 | 10:49:12 AM
Solid collection of open source tools> what's your favorite?
Great job, Ericka on putting this together. Wondering which ones Dark Reading commnunity members use and what are their favorites. Share your thoughts in the comments. 
New Bluetooth Hack Affects Millions of Vehicles
Dark Reading Staff 11/16/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17948
PUBLISHED: 2018-11-20
An open redirect vulnerability exists in the Access Manager Identity Provider prior to 4.4 SP3.
CVE-2018-1779
PUBLISHED: 2018-11-20
IBM API Connect 2018.1 through 2018.3.7 could allow an unauthenticated attacker to cause a denial of service due to not setting limits on JSON payload size. IBM X-Force ID: 148802.
CVE-2018-19367
PUBLISHED: 2018-11-20
Portainer through 1.19.2 provides an API endpoint (/api/users/admin/check) to verify that the admin user is already created. This API endpoint will return 404 if admin was not created and 204 if it was already created. Attackers can set an admin password in the 404 case.
CVE-2018-19335
PUBLISHED: 2018-11-20
Google Monorail before 2018-06-07 has a Cross-Site Search (XS-Search) vulnerability because CSV downloads are affected by CSRF, and calculations of download times (for requests with a crafted groupby value) can be used to obtain sensitive information about the content of bug reports.
CVE-2018-19334
PUBLISHED: 2018-11-20
Google Monorail before 2018-05-04 has a Cross-Site Search (XS-Search) vulnerability because CSV downloads are affected by CSRF, and calculations of download times (for requests with an unsupported axis) can be used to obtain sensitive information about the content of bug reports.