software

Eternal Blues: A free EternalBlue vulnerability scanner
It is to be hoped that after the WannaCry and NotPetya outbreaks, companies will finally make sure to install – on all their systems – the Windows update that …

Russia threatening to ban Telegram encrypted messaging app
Roskomnadzor, Russia’s communications regulator, is threatening to ban the use of popular encrypted messaging app Telegram. The request Roskomnadzor is a federal agency …

Mozilla ports simplified private browsing app to Android
Less than a year since the release of Firefox Focus for iOS, Mozilla has ported the privacy-focused browser to Android. What is Firefox Focus? Firefox Focus is a simplified …

Nmap 7.50 released: New NSE scripts, 300+ fingerprints, new Npcap
Nmap 7.50 is the first big release since last December and has hundreds of improvements. One of the things the developers have worked on recently is the Npcap packet capturing …

Outdated systems and their link to data breaches
BitSight analyzed more than 35,000 companies from industries across the globe over the last year, to better understand the usage of outdated computer operating systems and …

GnuPG developers start new fundraising effort
Werner Koch and his team of GnuPG developers are asking for funding for the continued development of the popular free email and data encryption software. What is GnuPG, and …

Endpoint Protector 5: Responsive interface and updated eDiscovery module
CoSoSys released Endpoint Protector 5 with updates on the management console which has been redesigned for a modern, user-friendly and responsive experience. “Endpoint …

Enterprise endpoint security: Millions of devices still running outdated systems
Duo Security analyzed the security health of 4.6 million endpoint devices, including 3.5 million mobile phones across multiple industries and geographic regions. With …

Vulnerability affecting 1,000+ apps is exposing terabytes of data
A newly discovered backend data exposure vulnerability, dubbed HospitalGown, highlights the connection between mobile apps and insecure backend databases. Appthority …

4 vectors transforming the security software market
The security software market is undergoing a transformation due to four key developments, according to Gartner. The use of advanced analytics, expanded ecosystems, adoption of …

8 RCE, DoS holes in Microsoft Malware Protection Engine plugged
After the discovery and the fixing of a “crazy bad” remote code execution flaw in the Microsoft Malware Protection Engine earlier this month, now comes another …

Healthcare industry continues to struggle with software security
67% of medical device manufacturers and 56% of healthcare delivery organizations (HDOs) believe an attack on a medical device built or in use by their organizations is likely …
Featured news
Resources
Don't miss
- Want fewer security fires to fight? Start with threat modeling
- Build a mobile hacking rig with a Pixel and Kali NetHunter
- Infostealer crackdown: Operation Secure takes down 20,000 malicious IPs and domains
- Connectwise is rotating code signing certificates. What happened?
- Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053)