software
RCE flaw affects DVRs sold by over 70 different vendors
RSA security researcher Rotem Kerner has discovered a remote code execution vulnerability that affects digital video recorders (DVRs) sold by more than 70 different vendors …
Tor Project exploring ways to keep its software and users safe
In view of the recent legal battle between the FBI and Apple regarding phone encryption, and this article revealing that there have been many instances where the US Department …
Google offers binary comparison tool BinDiff for free
In case you missed it, Google announced on Friday that BinDiff, a comparison tool for binary files, can now be downloaded for free. The tool is used to spot differences and …
Lynis 2.2.0: New features, tests, and enhancements
Lynis is a popular open source security auditing tool, used to evaluate the security defenses of their Linux/Unix-based systems. It runs on the host itself, so it performs …
MobSF: Security analysis of Android and iOS apps
The Mobile Security Framework (MobSF) is an open source framework capable of performing end to end security testing of mobile applications. MobSF can be used for security …
Cloud Status: Free app for cloud infrastructure monitoring
Server Density released a new free iOS app that enables you to stay up to date with the service status from key cloud providers. The Cloud Status app sends you notifications …
Web application scanning with Htcap
Htcap is a free web application scanner that can crawl single page applications in a recursive manner by intercepting Ajax calls and DOM changes. The app is focused mainly on …
MariaDB Enterprise: Security at every level in the database
MariaDB announced MariaDB Enterprise Spring 2016. New capabilities defend data against application and network-level attacks, support faster development of high-performance …
BorgBackup: Deduplication with compression and authenticated encryption
BorgBackup is a deduplicating backup program that supports compression and authenticated encryption. The main goal of BorgBackup is to provide an efficient and secure way to …
ServiceNow reinvents security response
ServiceNow is extending its automation and orchestration expertise to transform the way organizations respond to threats. Security Operations gives both security and IT teams …
FTC forces Asus to improve router security
The Federal Trade Commission (FTC) is actively trying to make sure that companies secure the software and devices that they provide to consumers, and Tuesday’s …
Attacker View exposes hidden cyber attack paths
Illusive networks launched illusive 3.0 with Attacker View, a technology that enables IT security professionals to view their corporate network from an attacker’s …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users