3 easy microsegmentation projects

Like many large-scale network security projects, microsegmentation can seem complex, time-consuming, and expensive. It involves managing intricate details about inter-device service connectivity. One web server should connect to specific... Read more »

SCCMSecrets: Open-source SCCM policies exploitation tool

SCCMSecrets is an open-source tool that exploits SCCM policies, offering more than just NAA credential extraction. SCCM policies are a key target for attackers in Active Directory environments, as... Read more »

How to Use a Conference Bridge to Run a Smooth Meeting

Setting up a conference bridge isn’t hard, but you don’t want to get it wrong for important calls. Learn how to bridge calls securely. Read more »

Is Cloud Fax Secure? Yes. Compliant? It Depends.

Explore cloud fax security and compliance. Learn about encryption, HIPAA, and records management for better document protection. Read more »

Tosint: Open-source Telegram OSINT tool

Tosint is an open-source Telegram OSINT tool that extracts useful information from Telegram bots and channels. It’s suited for security researchers, investigators, and others who want to gather insights... Read more »

NetAlertX: Open-source Wi-Fi intruder detector

NetAlertX is an open-source Wi-Fi/LAN intruder detection tool that scans your network for connected devices and alerts you when new or unknown devices are detected. It provides visibility into... Read more »

Certainly: Open-source offensive security toolkit

Certainly is an open-source offensive security toolkit designed to capture extensive traffic across various network protocols in bit-flip and typosquatting scenarios. Built-in protocols: DNS, HTTP(S), IMAP(S), SMTP(S). “The reason... Read more »

Paid open-source maintainers spend more time on security

Paid maintainers are 55% more likely to implement critical security and maintenance practices than unpaid maintainers and are dedicating more time to implementing security practices like those included in... Read more »

5 Compelling Reasons Not to Manage Your Own VoIP Server

Discover why managing your own VoIP server can be costly, dangerous, and time-consuming for most businesses. Read more »

HackerOne: Nearly Half of Security Professionals Believe AI Is Risky

The Hacker-Powered Security Report showed mixed feelings toward AI in the security community, with many seeing leaked training data as a threat. Read more »
Subscribe to our Newsletter