Security News

6 Best Open Source Password Managers for Windows in 2024
2024-04-09 10:29

While closed-source password managers don't publicly share their codes for users to modify, open-source password managers do share their codes with a community of users to revise or update over time. Top open-source password managers for Windows comparison table.

EJBCA: Open-source public key infrastructure (PKI), certificate authority (CA)
2024-04-09 04:30

It can handle almost anything, and someone once called it the kitchen sink of PKI. With its extensive history as one of the longest-standing CA software projects, EJBCA offers proven robustness, reliability, and adaptability. "EJBCA was created as an open-source project. The first version of the software was released as open source in December 2001. The ability to make a living from working with it and form a good company with many developers working on open source came later when the co-founders of PrimeKey and I realized that it was something we could do," Tomas Gustavsson, the creator of EJBCA, told Help Net Security.

What can be done to protect open source devs from next xz backdoor drama?
2024-04-06 16:12

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Mantis: Open-source framework that automates asset discovery, reconnaissance, scanning
2024-04-04 04:30

Mantis is an open-source command-line framework that automates asset discovery, reconnaissance, and scanning. You input a top-level domain, and it identifies associated assets, such as subdomains and certificates.

Cloud Active Defense: Open-source cloud protection
2024-04-02 04:30

Cloud Active Defense is an open-source solution that integrates decoys into cloud infrastructure. It creates a dilemma for attackers: risk attacking and being detected immediately, or avoid the traps and reduce their effectiveness.

Malicious xz backdoor reveals fragility of open source
2024-04-01 21:16

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Drozer: Open-source Android security assessment framework
2024-03-27 04:30

Drozer is an open-source security testing framework for Android, whose primary purpose is to make the life of mobile application security testers easier. The solution enables the identification of security vulnerabilities in applications and devices by taking on the role of an app and facilitating interactions with the Dalvik VM, other apps' IPC endpoints, and the operating system.

20 essential open-source cybersecurity tools that save you time
2024-03-25 06:00

When I started digging deeper into the open-source cybersecurity ecosystem, I discovered an engaged community of developers working to find practical solutions to many problems, one of them being saving time. Here are 20 essential open-source cybersecurity tools that are freely available and waiting for you to include them in your arsenal.

WebCopilot: Open-source automation tool enumerates subdomains, detects bugs
2024-03-21 05:30

WebCopilot is an open-source automation tool that enumerates a target's subdomains and discovers bugs using various free tools. Subdomain enumeration: It leverages tools like Assetfinder, Subfinder, Amass, and httpx to comprehensively discover subdomains.

Lynis: Open-source security auditing tool
2024-03-19 04:00

Lynis is a comprehensive open-source security auditing tool for UNIX-based systems, including Linux, macOS, and BSD. Hardening with Lynis. Lynis conducts a thorough security examination of the system directly.