
SniperPhish: An all-in-one open-source phishing toolkit
SniperPhish is an all-in-one open-source phishing toolkit that pentesters and other security professionals can use for setting up and executing email and web-based spear …
Guardicore extends microsegmentation and zero trust security to protect legacy infrastructure and IT
Guardicore announced new capabilities that extends microsegmentation and zero trust security to the industry broadest catalog of legacy servers, applications, and operating …
Threat Stack partners with Liquid Web to extend the Threat Stack Oversight IDS to customers
Threat Stack announced a strategic partnership with Liquid Web. As part of this partnership, Liquid Web customers can employ the Threat Stack Oversight Intrusion Detection …

Massive increase in endpoint attacks, rising rate of encrypted malware and new exploits targeting IoT
Fileless malware and cryptominer attack rates grew by nearly 900% and 25% respectively, while unique ransomware payloads plummeted by 48% in 2020 compared to 2019, according …
KanguruClone 11 M.2 NVMe SSD Pro Duplicator provides high-volume NVMe cloning
Kanguru introduces the KanguruClone 11 M.2 NVMe SSD Pro Duplicator, enabling IT professionals to duplicate up to eleven PCIe M.2 NVMe SSDs at once, providing ideal high-volume …
DH2i DxEnterprise 20 improves performance and resilience of transaction processing workloads
DH2i announced the general availability of DxEnterprise version 20, engineered to improve the performance and resilience of transaction processing workloads found in financial …

Now-fixed Linux kernel vulnerabilities enabled local privilege escalation (CVE-2021-26708)
Security researcher Alexander Popov has discovered and fixed five similar issues in the virtual socket implementation of the Linux kernel. The vulnerabilities could be …

IPCDump: Open-source tool for tracing interprocess communication on Linux
Guardicore released IPCDump, a new open source tool for tracing interprocess communication on Linux. The tool covers most interprocess communication (IPC) mechanisms, …

Linux malware backdoors supercomputers
ESET researchers discovered Kobalos, a malware that has been attacking supercomputers – high performance computer (HPC) clusters – as well as other targets such as a …

AlmaLinux Beta released, the CentOS replacement is ready for testing
AlmaLinux, the open source enterprise-level Linux distribution created as an alternative to CentOS, is released in beta with most RHEL packages and is ready for community …

“Serious” vulnerability found in Libgcrypt, GnuPG’s cryptographic library
Libgcrypt 1.9.0, the newest version of a cryptographic library integrated in the GNU Privacy Guard (GnuPG) free encryption software, has a “severe” security …

Sudo vulnerability allows attackers to gain root privileges on Linux systems (CVE-2021-3156)
A vulnerability (CVE-2021-3156) in sudo, a powerful and near-ubiquitous open-source utility used on major Linux and Unix-like operating systems, could allow any unprivileged …
Featured news
Resources
Don't miss
- The XCSSET info-stealing malware is back, targeting macOS users and devs
- A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)
- Two Estonians plead guilty in $577M cryptocurrency Ponzi scheme
- How CISOs can balance security and business agility in the cloud
- Orbit: Open-source Nuclei security scanning and automation platform