Archive for the ‘Security Tools’ Category

SANS Faculty Free Tools

FREE Open Source Security Tools 🛠- SANS Institute Hacker Techniques, Tools, and Incident Handling

Leave a Comment

What Security Engineers Hate About SIEM

SIEM Satisfaction is Mediocre When CISOs, CIOs, CTOs, security engineers, security analysts and security architects were asked to rank the primary capabilities of a traditional SIEM according to how satisfied they were with those capabilities, an interesting picture emerged. The survey results indicated that every primary capability of traditional SIEM solutions, at best, only somewhat […]

Leave a Comment

CISA compiled a list of free cybersecurity tools and services

The U.S. CISA has created a list of free cybersecurity tools and services that can help organizations increase their resilience. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced this week that it has compiled a list of free cybersecurity tools and services that can help organizations to reduce cybersecurity risk and increase resilience. The […]

Leave a Comment

Image OSINT Tutorial – Exif, Metadata, Reverse Image & Geolocation

The internet is making the world a much smaller place over the period, allowing millions of users throughout the globe to interact and share digital information, ushering the rest of the world into the ‘digital world.’ Open-source intelligence (OSINT) in the digital world describes all the public data you can access and view. Images are also […]

Leave a Comment

US NCSC and DoS share best practices against surveillance tools

The US National Counterintelligence and Security Center (NCSC) and the Department of State have published joint guidance that provides best practices on defending against attacks carried out by threat actors using commercial surveillance tools. In the last years, we have reported several cases of companies selling commercial surveillance tools to governments and other entities that have […]

Leave a Comment

SANS Free Tools

Leave a Comment

Hacking tools cheat sheet

Leave a Comment

Redeem your 10% discount on any toolkit

Leave a Comment

List of data breaches and cyber attacks in November 2021 – 223.6 million records breached

Luke Irwin  1st December 2021 In November, we discovered 81 publicly disclosed cyber security incidents, accounting for 223,615,390 breached records. With one month left in 2021, the annual total running total of compromised records is to just shy of 5 billion. Keep an eye out for our end-of-year report in the next few weeks, where we’ll […]

Leave a Comment

InfoSec books, toolkits, and training courses – 15% off

Save 15% off books, toolkits, self-paced training courses, and selected Live Online training courses. Use code BF15 at checkout to claim your discount. But hurry, offer ends tomorrow 30 November, midnight PDT*. This Black Friday ITG is offering you 15% off ITGP books, ITGP toolkits, self-paced training courses, and selected Live Online training courses. Discover all resources     […]

Leave a Comment

US Bureau of Industry and Security bans export of hacking tools to authoritarian regimes

The Commerce Department’s Bureau of Industry and Security (BIS) would ban U.S. firms from selling hacking tools to authoritarian regimes. The Commerce Department’s Bureau of Industry and Security (BIS) would introduce a new export control rule aimed at banning the export or resale of hacking tools to authoritarian regimes.  The rule announced by the BIS tightens export controls on […]

Leave a Comment

Fortinet FortiWeb OS Command Injection allows takeover servers remotely

Fortinet addresses a command injection vulnerability that can allow attackers to take complete control of servers running vulnerable FortiWeb WAF installs. An authenticated attacker could execute arbitrary commands as the root user on the underlying system via the SAML server configuration page. Experts pointed out that the flaw could be chained with an authentication bypass flaw that […]

Leave a Comment

Google open-sourced Allstar tool to secure GitHub repositories

Google has open-sourced the Allstar tool that can be used to secure GitHub projects and prevent security misconfigurations. Google has open-sourced the Allstar tool that can be used to secure GitHub projects by enforcing a set of security policies to prevent misconfiguration. “Allstar is a GitHub App installed on organizations or repositories to set and enforce security policies. Its […]

Leave a Comment

TeamTNT group adds new detection evasion tool to its Linux miner

The TeamTNT cybercrime group has upgraded their Linux cryptocurrency miner by adding open-source detection evasion capabilities, AT&T Alien Labs researchers warn. Early this year, researchers from Trend Micro discovered that the TeamTNT botnet was improved with the ability to steal Docker credentials. The TeamTNT botnet is a crypto-mining malware operation that has been active since April 2020 and that targets Docker […]

Leave a Comment

ISO Self Assessment Tools

ISO Self assessment tools list includes but not limited to Privacy, ISO 27001, ISO 9001 and ISO 14001 & ISO/IEC 27701 2019 Standard and Toolkit

Leave a Comment

SANS Faculty Free Tools

SANS Faculty free tools download

Leave a Comment

FREE Open Source Tools

FREE Open Source Tools – via SANS Institute Download a pdf Open source intelligence (OSINT) Open source intelligence (OSINT) Guide: 21 OSINT Tools for Threat Intelligence OSINT Tutorial to Find Personal Information Cybersecurity Tools | Popular Tools for Cybersecurity Threats Download a CyberAware cheat sheet

Leave a Comment

Chinese spies stole NSA hacking tools, report finds

In the report, the cybersecurity company Symantec claims that a Chinese hacker group associated with Chinese government intelligence conducted a hacking campaign using a tool that at the time was only known to be the property of the NSA. Source: Chinese spies stole NSA hacking tools, report finds Enter your email address: Delivered by FeedBurner

Leave a Comment

Zydra : Password Recovery Tool & Linux Shadow File Cracker

Zydra is a file password recovery tool and Linux shadow file cracker. It uses the dictionary search or Brute force method for cracking passwords. Source: Zydra : Password Recovery Tool & Linux Shadow File Cracker  Subscribe in a reader

Leave a Comment

Computer security training courses

Computer security training courses – Online cyber security courses Build your cyber security awareness and InfoSec career to keep your cyber security skills relevant. Learn how to protect your information assets against today’s cyber threats with best online cyber security training courses.   DISC InfoSec cyber security training curriculum includes specialized InfoSec training and general cyber […]

Comments (1)