John the Ripper is a popular password cracking tool that can be used to perform brute-force attacks using different encryption technologies and helpful wordlists. It’s often what pen-testers and ethical hackers use to find the true passwords behind hashes. This…
Tag: esecurityplanet
Open Source Security Index Lists Top Projects
Two venture investors have launched an index to track the most popular open source security projects. Chenxi Wang of Rain Capital and Andrew Smyth of Atlantic Bridge unveiled the Open Source Security Index last month. The website leverages GitHub application…
Hackers Use RMM Software to Breach Federal Agencies
Cybercriminals recently breached U.S. federal agencies using remote monitoring and management (RMM) software as part of a widespread campaign. The malicious campaign began in June 2022 or earlier and was detected a few months later, according to an advisory from…
10 Best Identity and Access Management (IAM) Solutions
Identity and Access Management (IAM) once helped IT departments in large enterprises to manage employees in Active Directory. In a modern IT environment IAM plays a far more critical role in authorizing geographically dispersed workforces as they connect to internal…
Threat Groups Distributing Malware via Google Ads
Security researchers are warning that Google Ads are being actively leveraged to distribute malware to unsuspecting victims searching for software downloads. On January 20, CronUp researcher Germán Fernández warned that the DEV-0569 ransomware group is using Google Ads to distribute…
How to Prevent Cross-Site Scripting (XSS) Attacks
Cross-site scripting attacks (XSS) are used to steal data and hijack browsing sessions so attackers can take action on a victim’s behalf. Attackers may use this opportunity to alter web pages, post on social accounts, initiate bank transfers or make…
Penetration Testing vs. Vulnerability Testing: An Important Difference
Many cybersecurity audits now ask whether penetration testing is conducted and how vulnerabilities are detected and tracked. These questions ask IT teams to consider how frequently security is tested from the outside via penetration testing and from the inside via…
Cybercriminals Use VSCode Extensions as New Attack Vector
Microsoft’s Visual Studio Code integrated development environment (IDE) is used by as much as 75% of developers, so any security issue has widespread implications. And Aqua Nautilus researchers have discovered a big one. The researchers reported earlier this month that…
13 Best Intrusion Detection and Prevention Systems (IDPS) for 2023
Intrusion detection systems (IDS) and intrusion prevention systems (IPS) – often combined as intrusion detection and prevention (IDPS) – have long been a key part of network security defenses for detecting, tracking, and blocking threatening traffic and malware. With the…
10 Best Open-Source Vulnerability Scanners for 2023
Vulnerability assessment tools scan assets for known vulnerabilities, misconfigurations, and other flaws. These scanners then output reports for IT security and application development operations (DevOps) teams that feed prioritized tasks into ticketing and workflow systems for remediation. Open source vulnerability…
13 Best Intrusion Detection and Prevention Systems (IDPS)
Intrusion detection systems (IDS) and intrusion prevention systems (IPS) – often combined as intrusion detection and prevention (IDPS) – have long been a key part of network security defenses for detecting, tracking, and blocking threatening traffic and malware. With the…
20 Top Cybersecurity Companies for 2023
As the demand for robust security defense grows, the market for cybersecurity technology has exploded, as have the number of available solutions. To help you navigate this growing market, we provide our recommendations for the world’s leading cybersecurity technology providers,…
ChatGPT’s Dark Side: An Endless Supply of Polymorphic Malware
CyberArk researchers are warning that OpenAI’s popular new AI tool ChatGPT can be used to create polymorphic malware. “[ChatGPT]’s impressive features offer fast and intuitive code examples, which are incredibly beneficial for anyone in the software business,” CyberArk researchers Eran…
16 Best Digital Forensics Tools & Software
For everything from minor network infractions to devastating cyberattacks and data privacy troubles, digital forensics software can help clean up the mess and get to the root of what happened. Since the inception of data forensics almost forty years ago, methods…
Cybersecurity in the Metaverse Will Require New Approaches
Despite challenges faced by Meta and others, there remains optimism for the metaverse. The PwC 2022 U.S. Business and Consumer Metaverse Survey highlights this. The survey, which included over 5,000 consumers and 1,000 U.S. business leaders, shows that half of…
Microsoft Patch Tuesday Fixes 11 Critical Vulnerabilities, One Zero-Day
Microsoft’s first Patch Tuesday of 2023 addresses 98 vulnerabilities, more than twice as many as last month – including one zero-day flaw that’s being actively exploited, as well as 11 critical flaws. The zero-day, CVE-2023-21674, is a Windows Advanced Local…
Researchers’ Quantum Threat Debunked, RSA Safe for Now
In a paper published late last month, 24 Chinese researchers suggested that RSA-2048 encryption could be broken using a quantum computer with 372 physical quantum bits. Cryptographer Bruce Schneier drew attention to the paper [PDF] last week in a blog…
16 Best Digital Forensics Tools & Software
The post 16 Best Digital Forensics Tools & Software appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original article: 16 Best Digital Forensics Tools & Software
Best Fraud Management Systems & Detection Tools
The post Best Fraud Management Systems & Detection Tools appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original article: Best Fraud Management Systems & Detection Tools
Best LastPass Alternatives: Compare Password Managers
The post Best LastPass Alternatives: Compare Password Managers appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original article: Best LastPass Alternatives: Compare Password Managers
5 Trends in Patch Management
The post 5 Trends in Patch Management appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original article: 5 Trends in Patch Management
Best Internet Security Software & Suites
The post Best Internet Security Software & Suites appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original article: Best Internet Security Software & Suites
12 Top Vulnerability Management Tools for 2023
Vulnerability management tools go well beyond patch management and vulnerability scanning tools by discovering security flaws in network and cloud environments and prioritizing and applying fixes. Many IT departments struggle to stay on top of security vulnerabilities, and many don’t…
Rackspace Breach Linked to New OWASSRF Vulnerability
Rackspace has acknowledged that it was hit by the Play ransomware a month ago in an attack that compromised customers’ Microsoft Exchange accounts. The attackers apparently leveraged a zero-day vulnerability called OWASSRF that was recently analyzed by CrowdStrike. In an…
The 22 Best Vulnerability Scanner Tools for 2023
Vulnerability scans play a critical role in protecting assets from attacker exploitation by identifying missing updates, misconfigurations, and other common security issues. Originally designed to test local networks and devices, vulnerability scanning tools have evolved to encompass the modern IT…
Security Outlook 2023: Cyber Warfare Expands Threats
After a year that saw massive ransomware attacks and open cyber warfare, the biggest question in cybersecurity for 2023 will likely be how much of those attack techniques get commoditized and weaponized. “In 2022, governments fought wars online, businesses were…