software
(IN)SECURE Magazine issue 35 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 35 has been released today. Table of contents: …
Open source vulnerability management platform
Denim Group announced ThreadFix, an open source, freely-available vulnerability management platform that accelerates the process of resolving application-level …
Deep Java source code analysis
GrammaTech announced CodeSonar for Java which works on all Java code, including code written for Android. The analysis flags quality and security defects. It also works …
CORE Security updates its vulnerability assessment software
CORE Security released the latest version of CORE Impact Professional vulnerability assessment and penetration testing software, that allows organizations to proactively test …
Tridium enhances Niagara Framework
Tridium released the latest update to its core software, NiagaraAX Framework 3.7. This release includes built-in mobile support, updated graphics, enhanced security features, …
RSA and Guidance Software partner on incident response
Guidance Software announced an interoperability partnership with RSA to interconnect Guidance’s EnCase Cybersecurity and the RSA enVision SIEM platform to enable …
Prenus: The pretty Nessus
Prenus is a hacked together Ruby script that can consume Nessus 2 files – with the help of an updated ruby-nessus gem. Prenus allows the output of a few different …
Google adds Do Not Track support to Chrome
The next official release of Google’s Chrome browser will more than likely support the Do Not Track (DNT) initiative by sending the DNT HTTP header to websites if the …
Open source Web server scanner Nikto 2.1.5 released
Nikto is an open source web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous files/CGIs, …
Messaging security platform for mobile network operators
Cloudmark announced Cloudmark Mobile Platform 3.0, a solution that provides real-time visibility and control of mobile messaging threats originating from internal or external …
RSA unifies identity and access management
RSA announced new solutions within its Identity and Access Management (IAM) suite designed to address security challenges that require new ways to manage and protect the …
Mobile device data visualization for field investigators
Cellebrite introduced UFED Link Analysis, a new product that allows field investigators to visualize key relationships between suspects and identify important behavior by …
Featured news
Resources
Don't miss
- Signal blocks Microsoft Recall from screenshotting conversations
- The hidden gaps in your asset inventory, and how to close them
- CTM360 report: Ransomware exploits trust more than tech
- Lumma Stealer Malware-as-a-Service operation disrupted
- Data-stealing VS Code extensions removed from official Marketplace