Ghidra 11.3 released: New features, performance improvements, bug fixes

NSA’s Research Directorate released version 11.3 of Ghidra, an open-source software reverse engineering (SRE) framework. It offers advanced analysis tools, enabling users to dissect and examine compiled code across... Read more »

How to Lock Apps on iPad

Set your iPad into kiosk mode and pass it around without worrying about someone opening other apps or accessing unwanted content through an accessibility feature called Guided Access. Learning... Read more »

CISA Adds Four Vulnerabilities to Catalog for Federal Enterprise

CISA adds four new vulnerabilities to its catalog, urging agencies to remediate risks. Learn about the latest exploits and how they impact enterprise security. Read more »

OpenNHP: Cryptography-driven zero trust protocol

OpenNHP is the open-source implementation of NHP (Network-resource Hiding Protocol), a cryptography-based zero trust protocol for safeguarding servers and data. OpenNHP offers the following benefits: Reduces attack surface by... Read more »

BadDNS: Open-source tool checks for subdomain takeovers

BadDNS is an open-source Python DNS auditing tool designed to detect domain and subdomain takeovers of all types. BadDNS modules cname – Check for dangling CNAME records and interrogate... Read more »

DeepSeek Locked Down Public Database Access That Exposed Chat History

Research Firm Wiz Research began investigating DeepSeek soon after its generative AI took the tech world by storm. Read more »

ExtensionHound: Open-source tool for Chrome extension DNS forensics

Traditional monitoring tools reveal only traffic from the Chrome process, leaving security teams uncertain about which extension is responsible for a suspicious DNS query. ExtensionHound solves this by analyzing... Read more »

BloodyAD: Open-source Active Directory privilege escalation framework

BloodyAD is an open-source Active Directory privilege escalation framework that uses specialized LDAP calls to interact with domain controllers. It enables various privilege escalation techniques within Active Directory environments.... Read more »

Don’t let these open-source cybersecurity tools slip under your radar

This article showcases free, open-source cybersecurity tools that help you identify and address vulnerabilities, detect intrusion, protect websites from cyber attacks, monitor and detect suspicious activities across your network.... Read more »

GUI frontends for GnuPG, the free implementation of the OpenPGP standard

GnuPG is a free and comprehensive implementation of the OpenPGP standard. It enables encryption and signing of data and communications, featuring a key management system and support for public... Read more »
Subscribe to our Newsletter