Please turn on your JavaScript for this page to function normally.
analytics IT assets
Google offers binary comparison tool BinDiff for free

In case you missed it, Google announced on Friday that BinDiff, a comparison tool for binary files, can now be downloaded for free. The tool is used to spot differences and …

Keyboard
Lynis 2.2.0: New features, tests, and enhancements

Lynis is a popular open source security auditing tool, used to evaluate the security defenses of their Linux/Unix-based systems. It runs on the host itself, so it performs …

MobSF
MobSF: Security analysis of Android and iOS apps

The Mobile Security Framework (MobSF) is an open source framework capable of performing end to end security testing of mobile applications. MobSF can be used for security …

cloud binary
Cloud Status: Free app for cloud infrastructure monitoring

Server Density released a new free iOS app that enables you to stay up to date with the service status from key cloud providers. The Cloud Status app sends you notifications …

Magnify
Web application scanning with Htcap

Htcap is a free web application scanner that can crawl single page applications in a recursive manner by intercepting Ajax calls and DOM changes. The app is focused mainly on …

MariaDB
MariaDB Enterprise: Security at every level in the database

MariaDB announced MariaDB Enterprise Spring 2016. New capabilities defend data against application and network-level attacks, support faster development of high-performance …

BorgBackup
BorgBackup: Deduplication with compression and authenticated encryption

BorgBackup is a deduplicating backup program that supports compression and authenticated encryption. The main goal of BorgBackup is to provide an efficient and secure way to …

lights
ServiceNow reinvents security response

ServiceNow is extending its automation and orchestration expertise to transform the way organizations respond to threats. Security Operations gives both security and IT teams …

ASUS
FTC forces Asus to improve router security

The Federal Trade Commission (FTC) is actively trying to make sure that companies secure the software and devices that they provide to consumers, and Tuesday’s …

illusive networks
Attacker View exposes hidden cyber attack paths

Illusive networks launched illusive 3.0 with Attacker View, a technology that enables IT security professionals to view their corporate network from an attacker’s …

PacketFence
PacketFence: Free and open source network access control

PacketFence is a fully supported, free and open source network access control (NAC) solution. Its feature set includes a captive-portal for registration and remediation, …

mitmproxy
Intercept, inspect and modify traffic flow with mitmproxy

mitmproxy is an interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed. All flows are kept in memory, which means that it’s …

Don't miss

Cybersecurity news