Security News

AuthLogParser: Open-source tool for analyzing Linux authentication logs
2024-01-08 05:30

AuthLogParser is an open-source tool tailored for digital forensics and incident response, specifically crafted to analyze Linux authentication logs. Log file, extracting crucial details like SSH logins, user creations, event names, IP addresses, among others.

Week in review: 15 open-source cybersecurity tools, Patch Tuesday forecast
2024-01-07 09:00

January 2024 Patch Tuesday forecast: A Focus on PrintingThis article aims to provide a quick summary of some of the latest trends, announcements, and changes associated with IT patch operations while looking at the upcoming Patch Tuesday and what software updates to expect. Emerging cybersecurity trends and expectations for 2024In this Help Net Security video, John Dwyer, Head of Research at IBM X-Force, discusses how 2024 is poised to be an incredibly impactful year for cyber attacks, driven by world events and access to advanced technologies like AI. 15 open-source cybersecurity tools you'll wish you'd known earlierIn this article, you will find a list of open-source cybersecurity tools that you should definitely check out.

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts
2024-01-04 05:30

DriveFS Sleuth automates the investigation of Google Drive File Stream disk artifacts. The tool can parse the disk artifacts and build a filesystem tree-like structure enumerating the synchronized files along with their respective properties.

15 open-source cybersecurity tools you’ll wish you’d known earlier
2024-01-04 05:00

Open-source tools represent a dynamic force in the technological landscape, embodying innovation, collaboration, and accessibility. In cybersecurity, open-source tools are invaluable assets, empowering organizations to fortify their defenses against evolving threats.

Subdominator: Open-source tool for detecting subdomain takeovers
2023-12-20 04:00

Subdominator is a dependable and fast open-source command-line interface tool to identify subdomain takeovers. It boasts superior accuracy and reliability, offering improvements compared to other tools.

EMBA: Open-source security analyzer for embedded devices
2023-12-19 05:00

The EMBA open-source security analyzer is tailored as the central firmware analysis tool for penetration testers and product security groups. It assists throughout the security evaluation procedure, extracting firmware, conducting static and dynamic analysis through emulation, and creating a web-based report.

GuardRail: Open-source tool for data analysis, AI content generation using OpenAI GPT models
2023-12-14 07:32

GuardRail OSS is an open-source project delivering practical guardrails to ensure responsible AI development and deployment. GuardRail OSS offers an API-driven framework for advanced data analysis, bias mitigation, sentiment analysis, content classification, and oversight tailored to an organization's specific AI needs.

A closer look at LATMA, the open-source lateral movement detection tool
2023-12-13 05:00

In this Help Net Security video, Gal Sadeh, Head of Data and Security Research at Silverfort, discusses LATMA, a free, open-source tool. It's engineered with advanced algorithms to track and report any unusual activity within an environment.

ThreatNG open-source datasets aim to improve cybersecurity practices
2023-12-13 04:30

The ThreatNG Governance and Compliance Dataset is an open-source initiative that aims to democratize access to critical data, fostering transparency, collaboration, and improvement of cybersecurity practices globally. The open-source datasets offered by ThreatNG provide an understanding of organizational practices, promoting informed decision-making and accountability within the corporate landscape.

Nemesis: Open-source offensive data enrichment and analytic pipeline
2023-12-12 04:30

Nemesis is a centralized data processing platform that ingests, enriches, and performs analytics on offensive security assessment data. Offensive data is not unified: it's siloed inside specific tools and machines rather than being modeled and analyzed holistically.