software

Kali Linux 2024.2 released: 18 new tools, countless updates

Kali Linux 2024.2 released: 18 new tools, countless updates 2024-06-05 at 21:31 By Help Net Security Kali Linux 2024.2 is now available. It includes future package compatibility for 32-bit platforms, improvements to GNOME 46 and Xfce, and 18 new tools. Desktop changes Kali 2024.2 introduces GNOME 46, offering a refined experience that builds on the […]

React to this headline:

Loading spinner

Kali Linux 2024.2 released: 18 new tools, countless updates Read More »

TotalRecall shows how easily data collected by Windows Recall can be stolen

TotalRecall shows how easily data collected by Windows Recall can be stolen 2024-06-05 at 13:16 By Zeljka Zorz Ethical hacker Alexander Hagenah has created TotalRecall, a tool that demonstrates how malicious individuals could abuse Windows’ newly announced Recall feature to steal sensitive information. TotalRecall results (Source: Alexander Hagenah) Copilot+ Recall and its security pitfalls On

React to this headline:

Loading spinner

TotalRecall shows how easily data collected by Windows Recall can be stolen Read More »

20 free cybersecurity tools you might have missed

20 free cybersecurity tools you might have missed 2024-06-04 at 07:31 By Help Net Security Free, open-source cybersecurity tools have become indispensable to protecting individuals, organizations, and critical infrastructure from cyber threats. These tools are created through collaborative and transparent efforts, making them affordable and accessible alternatives to proprietary software. Here, you will find a

React to this headline:

Loading spinner

20 free cybersecurity tools you might have missed Read More »

NethSecurity: Open-source Linux firewall

NethSecurity: Open-source Linux firewall 2024-06-03 at 07:31 By Mirko Zorz NethSecurity is a free, open-source Linux firewall that simplifies network security deployment. It integrates various security features into one platform, including firewalling, intrusion detection and prevention, antivirus, multi-WAN, DNS, and content filtering. NethSecurity has an intuitive interface that delivers real-time insights and control over network

React to this headline:

Loading spinner

NethSecurity: Open-source Linux firewall Read More »

Encrypted Notepad: Open-source text editor

Encrypted Notepad: Open-source text editor 2024-05-31 at 06:33 By Mirko Zorz Encrypted Notepad, an open-source text editor, ensures your files are saved and loaded encrypted with AES-256. With no ads, no network connection required, and no unnecessary features, it’s a tool that simply works. “Like the Windows Notepad app, it has no features besides text

React to this headline:

Loading spinner

Encrypted Notepad: Open-source text editor Read More »

RansomLord: Open-source anti-ransomware exploit tool

RansomLord: Open-source anti-ransomware exploit tool 2024-05-29 at 07:01 By Mirko Zorz RansomLord is an open-source tool that automates the creation of PE files, which are used to exploit ransomware pre-encryption. “I created RansomLord to demonstrate ransomware is not invincible, has vulnerabilities and its developers make mistakes and can write bad code just like everyone else,”

React to this headline:

Loading spinner

RansomLord: Open-source anti-ransomware exploit tool Read More »

Chronon: Open-source data platform for AI/ML applications

Chronon: Open-source data platform for AI/ML applications 2024-05-27 at 07:01 By Mirko Zorz Chronon is an open-source, end-to-end feature platform designed for machine learning (ML) teams to build, deploy, manage, and monitor data pipelines for machine learning. Chronon enables you to harness all the data within your organization, including batch tables, event streams, and services,

React to this headline:

Loading spinner

Chronon: Open-source data platform for AI/ML applications Read More »

Fail2Ban: Ban hosts that cause multiple authentication errors

Fail2Ban: Ban hosts that cause multiple authentication errors 2024-05-24 at 08:02 By Mirko Zorz Fail2Ban is an open-source tool that monitors log files, such as /var/log/auth.log, and blocks IP addresses that exhibit repeated failed login attempts. It does this by updating system firewall rules to reject new connections from those IP addresses for a configurable

React to this headline:

Loading spinner

Fail2Ban: Ban hosts that cause multiple authentication errors Read More »

Authelia: Open-source authentication and authorization server

Authelia: Open-source authentication and authorization server 2024-05-22 at 07:33 By Mirko Zorz Authelia is an open-source authentication and authorization server that offers 2FA and SSO for applications through a web portal. It works alongside reverse proxies to permit, deny, or redirect requests. Authelia connects directly to the reverse proxy but never to the application backends.

React to this headline:

Loading spinner

Authelia: Open-source authentication and authorization server Read More »

Grafana: Open-source data visualization platform

Grafana: Open-source data visualization platform 2024-05-20 at 07:31 By Mirko Zorz Grafana is an open-source solution for querying, visualizing, alerting, and exploring metrics, logs, and traces regardless of where they are stored. Grafana provides tools to transform your time-series database (TSDB) data into meaningful graphs and visualizations. Additionally, its plugin framework lets you integrate various

React to this headline:

Loading spinner

Grafana: Open-source data visualization platform Read More »

Is an open-source AI vulnerability next?

Is an open-source AI vulnerability next? 2024-05-16 at 08:31 By Help Net Security AI has captured widespread interest and offers numerous benefits. However, its rapid advancement and widespread adoption raise concerns, especially for those of us in cybersecurity. With so much interest, there are lots of insecure applications finding their way onto our devices and

React to this headline:

Loading spinner

Is an open-source AI vulnerability next? Read More »

OWASP dep-scan: Open-source security and risk audit tool

OWASP dep-scan: Open-source security and risk audit tool 2024-05-16 at 08:01 By Mirko Zorz OWASP dep-scan is an open-source security and risk assessment tool that leverages information on vulnerabilities, advisories, and licensing restrictions for project dependencies. It supports local repositories and container images as input sources, making it suitable for integration with ASPM/VM platforms and

React to this headline:

Loading spinner

OWASP dep-scan: Open-source security and risk audit tool Read More »

BLint: Open-source tool to check the security properties of your executables

BLint: Open-source tool to check the security properties of your executables 2024-05-14 at 07:31 By Mirko Zorz BLint is a Binary Linter designed to evaluate your executables’ security properties and capabilities, utilizing LIEF for its operations. From version 2, BLint can also produce Software Bill-of-Materials (SBOM) for compatible binaries. BLint features “Several source code analysis

React to this headline:

Loading spinner

BLint: Open-source tool to check the security properties of your executables Read More »

How AI affects vulnerability management in open-source software

How AI affects vulnerability management in open-source software 2024-05-13 at 07:01 By Help Net Security In this Help Net Security video, Itamar Sher, CEO of Seal Security, discusses how AI affects the risk and operational aspects of managing vulnerabilities in open-source software. One of the core issues around open-source vulnerability patch management has been the

React to this headline:

Loading spinner

How AI affects vulnerability management in open-source software Read More »

Nmap 7.95 released: New OS and service detection signatures

Nmap 7.95 released: New OS and service detection signatures 2024-05-10 at 07:31 By Help Net Security Nmap is a free, open-source tool for network discovery and security auditing. It’s valued by systems and network administrators for network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap identifies available hosts on a network,

React to this headline:

Loading spinner

Nmap 7.95 released: New OS and service detection signatures Read More »

Regulators are coming for IoT device security

Regulators are coming for IoT device security 2024-05-09 at 08:01 By Help Net Security Cybersecurity is a relatively new challenge for many IoT device makers who have traditionally produced non-connected devices. These devices were less vulnerable to exploitation and, as a result, manufacturers often lack the expertise and experience needed to effectively secure their connected

React to this headline:

Loading spinner

Regulators are coming for IoT device security Read More »

Pktstat: Open-source ethernet interface traffic monitor

Pktstat: Open-source ethernet interface traffic monitor 2024-05-08 at 07:01 By Mirko Zorz Pktstat is an open-source tool that is a straightforward alternative to ncurses-based Pktstat. On Linux, it utilizes AF_PACKET, while on other platforms, it employs generic PCAP live wire capture. Pktstat is a versatile tool that doesn’t rely on advanced or recent Linux kernel

React to this headline:

Loading spinner

Pktstat: Open-source ethernet interface traffic monitor Read More »

reNgine: Open-source automated reconnaissance framework for web applications

reNgine: Open-source automated reconnaissance framework for web applications 2024-05-02 at 07:31 By Mirko Zorz reNgine is an open-source automated reconnaissance framework for web applications that focuses on a highly configurable and streamlined recon process. Developing reNgine reNgine was developed to overcome the constraints of conventional reconnaissance tools. It is a good choice for bug bounty

React to this headline:

Loading spinner

reNgine: Open-source automated reconnaissance framework for web applications Read More »

Tracecat: Open-source SOAR

Tracecat: Open-source SOAR 2024-04-30 at 07:31 By Mirko Zorz Tracecat is an open-source automation platform for security teams. The developers believe security automation should be accessible to everyone, especially understaffed small- to mid-sized teams. Core features, user interfaces, and day-to-day workflows are based on existing best practices from best-in-class security teams. Use specialized AI models

React to this headline:

Loading spinner

Tracecat: Open-source SOAR Read More »

Researchers unveil novel attack methods targeting Intel’s conditional branch predictor

Researchers unveil novel attack methods targeting Intel’s conditional branch predictor 2024-04-29 at 13:46 By Help Net Security Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. The multi-university and industry research team led

React to this headline:

Loading spinner

Researchers unveil novel attack methods targeting Intel’s conditional branch predictor Read More »

Scroll to Top