software
Google offers binary comparison tool BinDiff for free
In case you missed it, Google announced on Friday that BinDiff, a comparison tool for binary files, can now be downloaded for free. The tool is used to spot differences and …
Lynis 2.2.0: New features, tests, and enhancements
Lynis is a popular open source security auditing tool, used to evaluate the security defenses of their Linux/Unix-based systems. It runs on the host itself, so it performs …
MobSF: Security analysis of Android and iOS apps
The Mobile Security Framework (MobSF) is an open source framework capable of performing end to end security testing of mobile applications. MobSF can be used for security …
Cloud Status: Free app for cloud infrastructure monitoring
Server Density released a new free iOS app that enables you to stay up to date with the service status from key cloud providers. The Cloud Status app sends you notifications …
Web application scanning with Htcap
Htcap is a free web application scanner that can crawl single page applications in a recursive manner by intercepting Ajax calls and DOM changes. The app is focused mainly on …
MariaDB Enterprise: Security at every level in the database
MariaDB announced MariaDB Enterprise Spring 2016. New capabilities defend data against application and network-level attacks, support faster development of high-performance …
BorgBackup: Deduplication with compression and authenticated encryption
BorgBackup is a deduplicating backup program that supports compression and authenticated encryption. The main goal of BorgBackup is to provide an efficient and secure way to …
ServiceNow reinvents security response
ServiceNow is extending its automation and orchestration expertise to transform the way organizations respond to threats. Security Operations gives both security and IT teams …
FTC forces Asus to improve router security
The Federal Trade Commission (FTC) is actively trying to make sure that companies secure the software and devices that they provide to consumers, and Tuesday’s …
Attacker View exposes hidden cyber attack paths
Illusive networks launched illusive 3.0 with Attacker View, a technology that enables IT security professionals to view their corporate network from an attacker’s …
PacketFence: Free and open source network access control
PacketFence is a fully supported, free and open source network access control (NAC) solution. Its feature set includes a captive-portal for registration and remediation, …
Intercept, inspect and modify traffic flow with mitmproxy
mitmproxy is an interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed. All flows are kept in memory, which means that it’s …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA