New Free Emulator Challenges Apple's Control of iOS
Thursday, 28 November 2019
An open-source tool gives researchers and jailbreakers a free option for researching vulnerabilities in the operating system – and gives Apple a new headache. A security researcher at Black Hat Europe in London next week plans to release an open source low-level emulator that can run a version of Apple’s mobile operating system. The project, based
- Published in Strategies
1 Comment
10 Low-Cost (or Free!) Ways to Boost Your Security …
Friday, 23 August 2019
The following hardware and software options will amplify your know-how about artificial intelligence and how to apply it to security – without busting any budgets. 1 of 11 From IT to marketing to HR, artificial intelligence (AI) is making its way throughout the enterprise. For security professionals, learning about the technology and how to apply
- Published in Threats, Threats Analysis
8 Free Tools to Be Showcased at Black Hat and DEF CON
Wednesday, 31 July 2019
Enterprise Vulnerabilities From DHS/US-CERT’s National Vulnerability Database CVE-2019-14361PUBLISHED: 2019-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-14439. Reason: This candidate is a reservation duplicate of CVE-2019-14439. Notes: All CVE users should reference CVE-2019-14439 instead of this candidate. All references and descriptions in this candidate have been removed to preve… CVE-2019-14452PUBLISHED: 2019-07-31
- Published in Strategies
FEC Gives Green Light for Free Cybersecurity Help …
Friday, 24 May 2019
Official opinion issued by the Federal Election Commission to nonprofit Defending Digital Campaigns is good news for free and reduced-cost security offerings to political candidates and committees. The Federal Election Commission (FEC) has approved a request by nonprofit Defending Digital Campaigns (DDC) to offer federal candidates and national political party committees free and discounted cybersecurity
- Published in Attacks
Free Princeton Application Provides IoT Traffic Insight
Friday, 19 April 2019
The application developed by a research group allows users to spot possible IoT security problems. A project at Princeton University is studying IoT devices used in homes and, in the process, has developed a tool that can give individuals a great deal of insight into the IoT activity going on all around them. The Princeton
- Published in Strategies
FireEye Creates Free Attack Toolset for Windows
Tuesday, 02 April 2019
The security services company releases a distribution of 140 programs for penetration testers who need to launch attacks and tools from an instance of Windows. Kali Linux has become the standard tool for offensive security specialists, but for penetration testers who need native Windows functionality, there has not been a similarly maintained set of tools.
- Published in Strategies
Security Firm to Offer Free Hacking Toolkit
Friday, 01 March 2019
CQTools suite includes both exploit kits and information-extraction functions, its developers say. A penetration testing and consulting firm plans to release a free penetration testing toolkit next month at Black Hat Asia; the toolkit includes privilege escalation and network attack functions. Paula Januszkiewicz, CEO of CQURE, says she and her team at the security firm are rolling
- Published in Threats, Threats Analysis
European Security Firm to Offer Free Hacking Toolkit
Thursday, 28 February 2019
CQTools suite includes both exploit kits and information-extraction functions, its developers say. A penetration testing and consulting firm based in Poland plans to release a free penetration testing toolkit next month at Black Hat Asia; the toolkit includes privilege escalation and network attack functions. Paula Januszkiewicz, CEO of CQURE, says she and her team at the security
- Published in Threats, Threats Analysis
7 cheap or free cyber security training resources
Wednesday, 27 February 2019
Scare headlines about the looming cybersecurity skills shortage are a regular feature in the trade press, and occasionally even make it into mainstream publications. If one thing is clear, it’s that companies outbidding each other for a tiny talent pool of security engineers with five to ten years’ experience is not a winning formula to
- Published in Strategies
New Free Tool Scans for Chrome Extension Safety
Friday, 22 February 2019
CRXcavator scans extensions in real time based on factors including permissions, external calls, and third-party libraries. Chrome is, by far, the most widely used browser in the world. Its popularity is enhanced by the more than 180,000 add-ins, themes, apps, and extensions available for the browser. But are they safe to use? Now a new
- Published in Threats, Threats Analysis
- 1
- 2