software

ServiceNow reinvents security response
ServiceNow is extending its automation and orchestration expertise to transform the way organizations respond to threats. Security Operations gives both security and IT teams …

FTC forces Asus to improve router security
The Federal Trade Commission (FTC) is actively trying to make sure that companies secure the software and devices that they provide to consumers, and Tuesday’s …

Attacker View exposes hidden cyber attack paths
Illusive networks launched illusive 3.0 with Attacker View, a technology that enables IT security professionals to view their corporate network from an attacker’s …

PacketFence: Free and open source network access control
PacketFence is a fully supported, free and open source network access control (NAC) solution. Its feature set includes a captive-portal for registration and remediation, …

Intercept, inspect and modify traffic flow with mitmproxy
mitmproxy is an interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed. All flows are kept in memory, which means that it’s …

Kotlin programming language for JVM and Android reaches version 1.0
Kotlin is an open source programming language for JVM and Android that combines OO and functional features and is focused on interoperability, safety, clarity and tooling …

Rooting malware lurking in third party Android app stores
Downloading Android apps from Google Play might not always be a safe proposition, but downloading them from third party app stores is definitely less safer. According to Trend …

Flaw in Sparkle Updater for Mac opens users of popular apps to system compromise
A security engineer has recently discovered a serious vulnerability in Sparkle, the widely used open source software update framework for Mac applications, that could be …

Network forensic analysis tool NetworkMiner 2.0 released
NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any …

Harnessing artificial intelligence to build an army of virtual analysts
Enterprises of all types and sizes are continually probed and targeted by cyber attackers. It doesn’t matter whether they are after the company’s or their …

Year-old crypto flaw in Socat created a potentially intentional backdoor
A backdoor has been discovered in Socat, a popular open-source network administration tool similar to Netcat, and its unclear how it hasn’t been spotted earlier or at …

“Deliberately hidden” backdoor found on US government’s comms system
Researchers from Austrian infosec outfit SEC Consult have unearthed what they dubbed a “deliberately hidden backdoor account” in NX-1200, a network controller …
Featured news
Resources
Don't miss
- Adobe patches critical Adobe Experience Manager Forms vulnerabilities with public PoC
- Trend Micro Apex One flaws exploted in the wild (CVE-2025-54948, CVE-2025-54987)
- Cybersecurity and the development of software-defined vehicles
- Ransomware is up, zero-days are booming, and your IP camera might be next
- AI in the SOC: Game-changer or more noise?