Remove open-source-tools
article thumbnail

6 Best Open Source IAM Tools in 2024

Tech Republic Security

Explore the top open source IAM (Identity and Access Management) tools, their features and how they can enhance your organization's security and access control.

160
160
article thumbnail

Cybercriminals Weaponizing Open-Source SSH-Snake Tool for Network Attacks

The Hacker News

A recently open-sourced network mapping tool called SSH-Snake has been repurposed by threat actors to conduct malicious activities. SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network," Sysdig researcher Miguel Hernández said.

139
139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Open Sources Magika: AI-Powered File Identification Tool

The Hacker News

Google has announced that it's open-sourcing Magika, an artificial intelligence (AI)-powered tool to identify file types, to help defenders accurately detect binary and textual file types.

article thumbnail

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

We Live Security

Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor

118
118
article thumbnail

Top Open Source Security Tools

eSecurity Planet

Over the past quarter of a century, the open source movement has gone from strength to strength. But that success and the openness inherent in the community have led to a major challenge – security. To make matters worse, the open source world prides itself on openness and transparency. WhiteSource.

article thumbnail

metahub: open-source security tool for context-based security vulnerability management

Penetration Testing

MetaHub MetaHub is an open-source security tool for context-based security vulnerability management. It focuses on... The post metahub: open-source security tool for context-based security vulnerability management appeared first on Penetration Testing.

article thumbnail

CISA releases open-source 'RedEye' C2 log visualization tool

Bleeping Computer

Cybersecurity and Infrastructure Security (CISA) agency has announced RedEye, an open-source analytic tool for operators to visualize and report command and control (C2) activity. [.].