Redis 8.2.2: Hardening the Lua Engine Against Four Critical Vulnerabilities

Introduction Redis is an open-source, in-memory data store widely used as a cache, message broker, and high-performance NoSQL database. It offers rich data structures like strings, hashes, lists, sets, sorted sets, bitmaps, HyperLogLogs, and streams, backed by atomic operations and very low latency. Persistence is available via RDB snapshots and AOF, and high availability is […]

The post Redis 8.2.2: Hardening the Lua Engine Against Four Critical Vulnerabilities appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

November 13, 2025
Read More >>

DefectDojo: Open-source DevSecOps platform

DefectDojo is an open-source tool for DevSecOps, application security posture management (ASPM), and vulnerability management. It helps teams manage security testing, track and remove duplicate findings, handle remediation, and generate reports. Whethe…

October 8, 2025
Read More >>

Five habits of highly secure development teams

In this Help Net Security video, Brendon Collins, Principal Consultant at Optiv, explores how organizations can embed security and privacy into the software development lifecycle (SDLC) from the very start. He outlines five proactive principles, includ…

September 3, 2025
Read More >>

AI built it, but can you trust it?

In this Help Net Security interview, John Morello, CTO at Minimus, discusses the security risks in AI-driven development, where many dependencies are pulled in quickly. He explains why it’s hard to secure software stacks that no one fully understands. …

July 7, 2025
Read More >>