software

Kanvas: Open-source incident response case management tool

Kanvas: Open-source incident response case management tool 2025-07-09 at 07:31 By Mirko Zorz Kanvas is an open-source incident response case management tool with a simple desktop interface, built in Python. It gives investigators a place to work with SOD (Spreadsheet of Doom) or similar files, so they can handle key tasks without jumping between different […]

React to this headline:

Loading spinner

Kanvas: Open-source incident response case management tool Read More »

ParrotOS 6.4 lands with key tool updates and kernel upgrade

ParrotOS 6.4 lands with key tool updates and kernel upgrade 2025-07-08 at 11:32 By Anamarija Pogorelec ParrotOS, known for its emphasis on security, privacy, and development, is widely used by cybersecurity professionals and enthusiasts alike. Version 6.4 delivers a host of updates and community-driven enhancements. The update is expected to be the final release in

React to this headline:

Loading spinner

ParrotOS 6.4 lands with key tool updates and kernel upgrade Read More »

Aegis Authenticator: Free, open-source 2FA app for Android

Aegis Authenticator: Free, open-source 2FA app for Android 2025-07-07 at 08:34 By Help Net Security Aegis Authenticator is an open-source 2FA app for Android that helps you manage login codes for your online accounts. The app features strong encryption and the ability to back up your data. It supports both HOTP and TOTP, so it

React to this headline:

Loading spinner

Aegis Authenticator: Free, open-source 2FA app for Android Read More »

GitPhish: Open-source GitHub device code flow security assessment tool

GitPhish: Open-source GitHub device code flow security assessment tool 2025-07-03 at 09:30 By Help Net Security GitPhish is an open-source security research tool built to replicate GitHub’s device code authentication flow. It features three core operating modes: an authentication server, automated landing page deployment, and an administrative management interface. GitPhish can be accessed via a

React to this headline:

Loading spinner

GitPhish: Open-source GitHub device code flow security assessment tool Read More »

Secretless Broker: Open-source tool connects apps securely without passwords or keys

Secretless Broker: Open-source tool connects apps securely without passwords or keys 2025-07-02 at 08:01 By Mirko Zorz Secretless Broker is an open-source connection broker that eliminates the need for client applications to manage secrets when accessing target services like databases, web services, SSH endpoints, or other TCP-based systems. Secretless Broker features “We created Secretless Broker

React to this headline:

Loading spinner

Secretless Broker: Open-source tool connects apps securely without passwords or keys Read More »

Kanister: Open-source data protection workflow management tool

Kanister: Open-source data protection workflow management tool 2025-06-26 at 08:04 By Help Net Security Kanister is an open-source tool that lets domain experts define how to manage application data using blueprints that are easy to share and update. It handles the complex parts of running these tasks on Kubernetes and gives a consistent way to

React to this headline:

Loading spinner

Kanister: Open-source data protection workflow management tool Read More »

Reconmap: Open-source vulnerability assessment, pentesting management platform

Reconmap: Open-source vulnerability assessment, pentesting management platform 2025-06-24 at 08:03 By Help Net Security Reconmap is an open source tool for vulnerability assessments and penetration testing. It helps security teams plan, carry out, and report on security tests from start to finish. The platform simplifies tasks and makes it easier for teams to work together,

React to this headline:

Loading spinner

Reconmap: Open-source vulnerability assessment, pentesting management platform Read More »

DuckDuckGo’s Scam Blocker now blocks more types of scams

DuckDuckGo’s Scam Blocker now blocks more types of scams 2025-06-20 at 12:24 By Sinisa Markovic Online scams are getting worse and more varied. DuckDuckGo knows that, so they’ve made changes. Their built-in Scam Blocker now stops more kinds of scam sites, all without tracking you. How Scam Blocker works (Source: DuckDuckGo) “If you accidentally click

React to this headline:

Loading spinner

DuckDuckGo’s Scam Blocker now blocks more types of scams Read More »

35 open-source security tools to power your red team, SOC, and cloud security

35 open-source security tools to power your red team, SOC, and cloud security 2025-06-18 at 08:31 By Help Net Security This article showcases free, open-source security tools that support your organization’s teams in red teaming, threat hunting, incident response, vulnerability scanning, and cloud security. Autorize: Burp Suite extension for automatic authorization enforcement detection Autorize is

React to this headline:

Loading spinner

35 open-source security tools to power your red team, SOC, and cloud security Read More »

MDEAutomator: Open-source endpoint management, incident response in MDE

MDEAutomator: Open-source endpoint management, incident response in MDE 2025-06-16 at 08:36 By Help Net Security Managing endpoints and responding to security incidents in Microsoft Defender for Endpoint (MDE) can be time-consuming and complex. MDEAutomator is an open-source tool designed to make that easier. MDEAutomator is a modular, serverless solution for IT and security teams looking

React to this headline:

Loading spinner

MDEAutomator: Open-source endpoint management, incident response in MDE Read More »

Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools

Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools 2025-06-14 at 12:17 By Zeljka Zorz OffSec has released Kali Linux 2025.2, the most up-to-date version of the widely used penetration testing and digital forensics platform. KDE Plasma 6.3 in Kali Linux 2025.2 (Source: OffSec) New in Kali Linux 2025.2 As per usual, the newest

React to this headline:

Loading spinner

Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools Read More »

Security flaws in government apps go unpatched for years

Security flaws in government apps go unpatched for years 2025-06-13 at 08:02 By Help Net Security 78% of public sector organizations are operating with significant security debt, flaws left unaddressed for more than a year, according to Veracode. 55% are burdened with ‘critical’ security debt, representing long-standing vulnerabilities with severe risk potential. Public sector flaw

React to this headline:

Loading spinner

Security flaws in government apps go unpatched for years Read More »

OWASP Nettacker: Open-source scanner for recon and vulnerability assessment

OWASP Nettacker: Open-source scanner for recon and vulnerability assessment 2025-06-11 at 09:01 By Mirko Zorz OWASP Nettacker is a free, open-source tool designed for network scanning, information gathering, and basic vulnerability assessment. Built and maintained by the OWASP community, Nettacker helps security pros automate common tasks like port scanning, service detection, and brute-force attacks. It

React to this headline:

Loading spinner

OWASP Nettacker: Open-source scanner for recon and vulnerability assessment Read More »

Android Enterprise update puts mobile security first

Android Enterprise update puts mobile security first 2025-06-10 at 21:04 By Mirko Zorz Google is rolling out new Android Enterprise features aimed at improving mobile security, IT management, and employee productivity. According to Zimperium’s 2025 Global Mobile Threat Report, attackers are now prioritizing mobile devices over desktops. Many security incidents involve smartphones, often due to

React to this headline:

Loading spinner

Android Enterprise update puts mobile security first Read More »

fiddleitm: Open-source mitmproxy add-on identifies malicious web traffic

fiddleitm: Open-source mitmproxy add-on identifies malicious web traffic 2025-06-09 at 08:00 By Mirko Zorz fiddleitm is an open-source tool built on top of mitmproxy that helps find malicious web traffic. It works by checking HTTP requests and responses for known patterns that might point to malware, phishing, or other threats. fiddleitm features “I created fiddleitm

React to this headline:

Loading spinner

fiddleitm: Open-source mitmproxy add-on identifies malicious web traffic Read More »

Meta open-sources AI tool to automatically classify sensitive documents

Meta open-sources AI tool to automatically classify sensitive documents 2025-06-05 at 09:17 By Mirko Zorz Meta has released an open source AI tool called Automated Sensitive Document Classification. It was originally built for internal use and is designed to find sensitive information in documents and apply security labels automatically. The tool uses customizable classification rules

React to this headline:

Loading spinner

Meta open-sources AI tool to automatically classify sensitive documents Read More »

Vet: Open-source software supply chain security tool

Vet: Open-source software supply chain security tool 2025-06-03 at 08:34 By Help Net Security Vet is an open source tool designed to help developers and security engineers spot risks in their software supply chains. It goes beyond traditional software composition analysis by detecting known vulnerabilities and flagging malicious packages. Vet supports several ecosystems, including npm,

React to this headline:

Loading spinner

Vet: Open-source software supply chain security tool Read More »

Development vs. security: The friction threatening your code

Development vs. security: The friction threatening your code 2025-06-03 at 07:32 By Sinisa Markovic Developers are driven to deliver new features quickly, while security teams prioritize risk mitigation, which often puts the two at odds. 61% of developers said that it’s critical that security doesn’t block or decelerate the development process or become a barrier

React to this headline:

Loading spinner

Development vs. security: The friction threatening your code Read More »

48% of security pros are falling behind compliance requirements

48% of security pros are falling behind compliance requirements 2025-06-02 at 07:07 By Help Net Security 32% of security professionals think they can deliver zero-vulnerability software despite rising threats and compliance regulations, according to Lineaje. Meanwhile, 68% are more realistic, noting they feel uncertain about achieving this near impossible outcome. Software compliance adoption varies across

React to this headline:

Loading spinner

48% of security pros are falling behind compliance requirements Read More »

Exchange 2016, 2019 support ends soon: What IT should do to stay secure

Exchange 2016, 2019 support ends soon: What IT should do to stay secure 2025-05-30 at 07:33 By Help Net Security Microsoft is ending support for Exchange Server 2016, Exchange Server 2019, and Outlook 2016 on October 14, 2025. That date might seem far off, but if you’re managing email systems or Office deployments, it’s worth

React to this headline:

Loading spinner

Exchange 2016, 2019 support ends soon: What IT should do to stay secure Read More »

Scroll to Top