Setting Up Your Network Security? Avoid These 4 Mistakes

Learn how to execute the fundamentals, harden your defenses, and protect your business’s network security with no high-tech software. Read more »

Are Ghost Calls a Problem? Yes, if They Don’t Stop

Ghost calls are an annoying indicator of a potential security issue. Learn why they happen, when you should worry, and how to stop them. Read more »

4 Reasons Not to Use a Fax Server and 3 Better Solutions

Using a fax server is a headache most companies can avoid. Modern solutions are cheaper, faster, and better for everyone at the office. Read more »

MaLDAPtive: Open-source framework for LDAP SearchFilter parsing, obfuscation, and more!

MaLDAPtive is an open-source framework for LDAP SearchFilter parsing, obfuscation, deobfuscation, and detection. At its core, the project features a custom-built C# LDAP parser designed for tokenization and syntax... Read more »

Exclusive: Google Cloud Updates Confidential Computing Portfolio

Users of Google Cloud’s virtual machines can now get in-house attestation for VMs that offer AMD encrypted virtualization. Read more »

Suricata: Open-source network analysis and threat detection

Suricata is an open-source network intrusion detection system (IDS), intrusion prevention system (IPS), and network security monitoring engine. Suricata features Suricata offers comprehensive capabilities for network security monitoring (NSM),... Read more »

What Is Inside Microsoft’s Major Windows 11 Update?

Version 24H2 adds the sudo command and alerts users when an application accesses their physical location. Microsoft polished other security features, too. Read more »

3 easy microsegmentation projects

Like many large-scale network security projects, microsegmentation can seem complex, time-consuming, and expensive. It involves managing intricate details about inter-device service connectivity. One web server should connect to specific... Read more »

SCCMSecrets: Open-source SCCM policies exploitation tool

SCCMSecrets is an open-source tool that exploits SCCM policies, offering more than just NAA credential extraction. SCCM policies are a key target for attackers in Active Directory environments, as... Read more »

How to Use a Conference Bridge to Run a Smooth Meeting

Setting up a conference bridge isn’t hard, but you don’t want to get it wrong for important calls. Learn how to bridge calls securely. Read more »
Subscribe to our Newsletter