Security News

Kali Linux 2024.1 released: New tools, new look, new Kali Nethunter kernels
2024-02-29 10:20

OffSec has released Kali Linux 2024.1, the latest version of its popular penetration testing and digital forensics platform.The new version comes with new tools, a fresh look, a new image viewer for the Gnome desktop and a usability enhancement to the Xfce desktop, and updates for the Kali NetHunter mobile pentesting platform.

Kali Linux 2024.1 released with 4 new tools, UI refresh
2024-02-28 19:47

Kali Linux has released version 2024.1, the first version of 2024, with four new tools, a theme refresh, and desktop changes. [...]

6 Best Open Source IAM Tools in 2024
2024-02-22 18:49

IAM tools help organizations secure and manage user identities and access to resources, ensuring only authorized individuals gain access. Keycloak adheres to standard protocols such as OpenID Connect, OAuth 2.0 and SAML and provides fine-grained authorization services that support different access control mechanisms like attribute-based access control, role-based access control, user-based access control, rule-based access control and context-based access control.

Microsoft Is Spying on Users of Its AI Tools
2024-02-20 12:02

Microsoft announced that it caught Chinese, Russian, and Iranian hackers using its AI tools-presumably coding tools-to improve their hacking abilities. In collaboration with OpenAI, we are sharing threat intelligence showing detected state affiliated adversaries-tracked as Forest Blizzard, Emerald Sleet, Crimson Sandstorm, Charcoal Typhoon, and Salmon Typhoon-using LLMs to augment cyberoperations.

5 free digital forensics tools to boost your investigations
2024-02-15 05:30

Digital forensics plays a crucial role in analyzing and addressing cyberattacks, and it's a key component of incident response. Digital forensics provides vital information for auditors, legal teams, and law enforcement agencies in the aftermath of an attack.

As-a-Service tools empower criminals with limited tech skills
2024-02-08 04:00

As-a-service attacks continue to dominate the threat landscape, with Malware-as-a-Service and Ransomware-as-a-Service tools making up the majority of malicious tools in use by attackers, according to Darktrace. As-a-Service tools can provide attackers with everything from pre-made malware to templates for phishing emails, payment processing systems and even helplines to enable criminals to mount attacks with limited technical knowledge.

Top 7 Cyber Threat Hunting Tools for 2024
2024-02-06 17:51

Cyber threat hunting is a proactive security measure taken to detect and neutralize potential threats on a network before they cause significant damage. Why we chose Cynet 360 AutoXDR. Cynet 360 made it to our list following its innovative approach to threat hunting executed through its deception feature that sets up decoy tokens for threat detection.

Custom rules in security tools can be a game changer for vulnerability detection
2024-02-01 05:30

Security teams need not take a binary approach to the tradeoff of fast scanning vs. vulnerability detection. How significant is the ability to write custom rules in security tools for organizations, and what impact does this have on the effectiveness of vulnerability detection?

Wazuh: Building robust cybersecurity architecture with open source tools
2024-01-17 15:04

Building a cybersecurity architecture requires organizations to leverage several security tools to provide multi-layer security in an ever-changing threat landscape. Organizations require various security tools that satisfy the key areas of a security architecture as they each play a role in securing digital assets.

Save up to $315 on data privacy tools with AdGuard VPN
2024-01-14 13:12

AdGuard VPN offers one-year, three-year, and five-year subscriptions to cover all of your devices, anywhere in the world. AdGuard VPN is built on a custom-designed protocol, drawing from the team's experience designing ad blockers and built from the ground up to provide faster connections while maintaining safety, even on unsecured public Wi-Fi networks.