Here’s our latest round-up of hacking tools available to pen testers, enterprise security specialists, and other infosec professionals at the start of the third quarter of...
Security teams have a new tool to hunt for malware, using open source YARA rules. YARAify can scan files using public YARA rules, integrate public and non-public...
As concern mounts about the security risks posed by overseas hackers, the US Commerce Department’s Bureau of Industry and Security (BIS) has published revisions to its...
The US government has warned that advanced persistent threat (APT) actors have fashioned tools capable of hijacking industrial devices deployed in critical infrastructure sectors. The bespoke hacking...
The newest version of TruffleHog has landed with support for more than 600 key types, furthering the tool’s ability to hunt for credential leaks. Leaked credentials,...
Deepfence has launched new open source tool PacketStreamer that captures network traffic from multiple sources to reveal potential hacking behaviors. PacketStreamer sensors collect raw network packets on...
An open source security tool has been launched with the promise of a “fool-proof way” to detect dangling elastic IP takeovers. Organizations leave themselves vulnerable to...
Researchers have demonstrated how a new tool can uncover redacted text from documents, potentially exposing sensitive information to nefarious actors. The tool, called Unredacter, was released by...
A principal salesman and ‘modder’ for Team Xecuter has been jailed for his role in a video game and console piracy operation. On Thursday (February 10),...
JavaScript developers will be better equipped to prevent malicious packages from slipping into their applications thanks to a trio of tools released by JFrog, the software company claims....
Recent Comments