OT PCAP Analyzer: Free PCAP analysis tool

EmberOT’s OT PCAP Analyzer, developed for the industrial security community, is a free tool providing a high-level overview of the devices and protocols in packet capture files. “The OT... Read more »

Argus: Open-source information gathering toolkit

Argus is an open-source toolkit that simplifies information gathering and reconnaissance. It features a user-friendly interface and a collection of powerful modules, enabling the exploration of networks, web applications,... Read more »

Aranya: Open-source toolkit to accelerate secure by design concepts

SpiderOak launched its core technology platform as an open-source project called Aranya. This release provides the same level of security as the company’s platform, which is already in use... Read more »

Can You Fax a Check? Yes. Follow These Steps to Do it Safely

Discover how to legally, securely, and quickly fax a check whether you’re using a traditional fax machine or an online faxing service. Read more »

Microsoft: Ransomware Attacks Growing More Dangerous, Complex

Attackers launched 600 million cybercriminal and nation-state threats on Microsoft customers daily, including ransomware attacks, in the last year, according to the tech giant. Read more »

GhostStrike: Open-source tool for ethical hacking

GhostStrike is an open-source, advanced cybersecurity tool tailored for ethical hacking and Red Team operations. It incorporates cutting-edge techniques, including process hollowing, to stealthily evade detection on Windows systems,... Read more »

How to Use Call Detail Records to Detect Fraud

Learn how data from call detail records can help you find fraud calls made by your phone system — and prevent them from happening again. Read more »

Generative AI in Security: Risks and Mitigation Strategies

Microsoft’s Siva Sundaramoorthy provides a blueprint for how common cyber precautions apply to generative AI deployed in and around security systems. Read more »

SentinelOne CISO Identifies ‘Most Pressing Concern’ for Cyber Professionals

SentinelOne’s Alex Stamos sees a future where defenders have the advantage when it comes to generative AI. At least until it can write exploit code. Read more »

Patch Tuesday: Internet Explorer Vulnerabilities Still Pose a Problem

Patch Tuesday brings patches for hundreds of vulnerabilities. Plus, Apple makes sure Sequoia plays nice with third-party security tools. Read more »
Subscribe to our Newsletter