Security News

4 Best Open Source Password Managers for Teams in 2024
2024-04-11 11:16

Open source password managers make their code accessible to the public, allowing users to customize the software to suit their needs. With that, I've created a list of the best open source password managers for teams and businesses.

Graylog: Open-source log management
2024-04-11 04:00

Please turn on your JavaScript for this page to function normally. Graylog is an open-source solution with centralized log management capabilities.

6 Best Open Source Password Managers for Mac in 2024
2024-04-10 10:27

While proprietary password managers offer convenience, open source alternatives provide transparency by allowing public scrutiny of their code, ensuring trustworthiness and strong security measures. Open source password managers grant users complete control over their data, reducing potential privacy concerns associated with closed-source software.

6 Best Open Source Password Managers for Windows in 2024
2024-04-09 10:29

While closed-source password managers don't publicly share their codes for users to modify, open-source password managers do share their codes with a community of users to revise or update over time. Top open-source password managers for Windows comparison table.

EJBCA: Open-source public key infrastructure (PKI), certificate authority (CA)
2024-04-09 04:30

It can handle almost anything, and someone once called it the kitchen sink of PKI. With its extensive history as one of the longest-standing CA software projects, EJBCA offers proven robustness, reliability, and adaptability. "EJBCA was created as an open-source project. The first version of the software was released as open source in December 2001. The ability to make a living from working with it and form a good company with many developers working on open source came later when the co-founders of PrimeKey and I realized that it was something we could do," Tomas Gustavsson, the creator of EJBCA, told Help Net Security.

What can be done to protect open source devs from next xz backdoor drama?
2024-04-06 16:12

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Mantis: Open-source framework that automates asset discovery, reconnaissance, scanning
2024-04-04 04:30

Mantis is an open-source command-line framework that automates asset discovery, reconnaissance, and scanning. You input a top-level domain, and it identifies associated assets, such as subdomains and certificates.

Cloud Active Defense: Open-source cloud protection
2024-04-02 04:30

Cloud Active Defense is an open-source solution that integrates decoys into cloud infrastructure. It creates a dilemma for attackers: risk attacking and being detected immediately, or avoid the traps and reduce their effectiveness.

Malicious xz backdoor reveals fragility of open source
2024-04-01 21:16

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Drozer: Open-source Android security assessment framework
2024-03-27 04:30

Drozer is an open-source security testing framework for Android, whose primary purpose is to make the life of mobile application security testers easier. The solution enables the identification of security vulnerabilities in applications and devices by taking on the role of an app and facilitating interactions with the Dalvik VM, other apps' IPC endpoints, and the operating system.