Suricata: Open-source network analysis and threat detection

Suricata is an open-source network intrusion detection system (IDS), intrusion prevention system (IPS), and network security monitoring engine. Suricata features Suricata offers comprehensive capabilities for network security monitoring (NSM),... Read more »

What Is Inside Microsoft’s Major Windows 11 Update?

Version 24H2 adds the sudo command and alerts users when an application accesses their physical location. Microsoft polished other security features, too. Read more »

3 easy microsegmentation projects

Like many large-scale network security projects, microsegmentation can seem complex, time-consuming, and expensive. It involves managing intricate details about inter-device service connectivity. One web server should connect to specific... Read more »

SCCMSecrets: Open-source SCCM policies exploitation tool

SCCMSecrets is an open-source tool that exploits SCCM policies, offering more than just NAA credential extraction. SCCM policies are a key target for attackers in Active Directory environments, as... Read more »

How to Use a Conference Bridge to Run a Smooth Meeting

Setting up a conference bridge isn’t hard, but you don’t want to get it wrong for important calls. Learn how to bridge calls securely. Read more »

Is Cloud Fax Secure? Yes. Compliant? It Depends.

Explore cloud fax security and compliance. Learn about encryption, HIPAA, and records management for better document protection. Read more »

Tosint: Open-source Telegram OSINT tool

Tosint is an open-source Telegram OSINT tool that extracts useful information from Telegram bots and channels. It’s suited for security researchers, investigators, and others who want to gather insights... Read more »

NetAlertX: Open-source Wi-Fi intruder detector

NetAlertX is an open-source Wi-Fi/LAN intruder detection tool that scans your network for connected devices and alerts you when new or unknown devices are detected. It provides visibility into... Read more »

Certainly: Open-source offensive security toolkit

Certainly is an open-source offensive security toolkit designed to capture extensive traffic across various network protocols in bit-flip and typosquatting scenarios. Built-in protocols: DNS, HTTP(S), IMAP(S), SMTP(S). “The reason... Read more »

Paid open-source maintainers spend more time on security

Paid maintainers are 55% more likely to implement critical security and maintenance practices than unpaid maintainers and are dedicating more time to implementing security practices like those included in... Read more »
Subscribe to our Newsletter