software
FTC forces Asus to improve router security
The Federal Trade Commission (FTC) is actively trying to make sure that companies secure the software and devices that they provide to consumers, and Tuesday’s …
Attacker View exposes hidden cyber attack paths
Illusive networks launched illusive 3.0 with Attacker View, a technology that enables IT security professionals to view their corporate network from an attacker’s …
PacketFence: Free and open source network access control
PacketFence is a fully supported, free and open source network access control (NAC) solution. Its feature set includes a captive-portal for registration and remediation, …
Intercept, inspect and modify traffic flow with mitmproxy
mitmproxy is an interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed. All flows are kept in memory, which means that it’s …
Kotlin programming language for JVM and Android reaches version 1.0
Kotlin is an open source programming language for JVM and Android that combines OO and functional features and is focused on interoperability, safety, clarity and tooling …
Rooting malware lurking in third party Android app stores
Downloading Android apps from Google Play might not always be a safe proposition, but downloading them from third party app stores is definitely less safer. According to Trend …
Flaw in Sparkle Updater for Mac opens users of popular apps to system compromise
A security engineer has recently discovered a serious vulnerability in Sparkle, the widely used open source software update framework for Mac applications, that could be …
Network forensic analysis tool NetworkMiner 2.0 released
NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any …
Harnessing artificial intelligence to build an army of virtual analysts
Enterprises of all types and sizes are continually probed and targeted by cyber attackers. It doesn’t matter whether they are after the company’s or their …
Year-old crypto flaw in Socat created a potentially intentional backdoor
A backdoor has been discovered in Socat, a popular open-source network administration tool similar to Netcat, and its unclear how it hasn’t been spotted earlier or at …
“Deliberately hidden” backdoor found on US government’s comms system
Researchers from Austrian infosec outfit SEC Consult have unearthed what they dubbed a “deliberately hidden backdoor account” in NX-1200, a network controller …
OpenWPM: An automated, open source framework for measuring web privacy
Among the speakers at the first ever Privacy Con, organized by the US Federal Trade Commission (FTC) and held last Thursday in Washington, DC, was Steven Englehard, a Ph.D. …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits