Tag: esecurityplanet

John the Ripper: Password Cracking Tutorial and Review

John the Ripper is a popular password cracking tool that can be used to perform brute-force attacks using different encryption technologies and helpful wordlists. It’s often what pen-testers and ethical hackers use to find the true passwords behind hashes. This…

Open Source Security Index Lists Top Projects

Two venture investors have launched an index to track the most popular open source security projects. Chenxi Wang of Rain Capital and Andrew Smyth of Atlantic Bridge unveiled the Open Source Security Index last month. The website leverages GitHub application…

Hackers Use RMM Software to Breach Federal Agencies

Cybercriminals recently breached U.S. federal agencies using remote monitoring and management (RMM) software as part of a widespread campaign. The malicious campaign began in June 2022 or earlier and was detected a few months later, according to an advisory from…

10 Best Identity and Access Management (IAM) Solutions

Identity and Access Management (IAM) once helped IT departments in large enterprises to manage employees in Active Directory. In a modern IT environment IAM plays a far more critical role in authorizing geographically dispersed workforces as they connect to internal…

Threat Groups Distributing Malware via Google Ads

Security researchers are warning that Google Ads are being actively leveraged to distribute malware to unsuspecting victims searching for software downloads. On January 20, CronUp researcher Germán Fernández warned that the DEV-0569 ransomware group is using Google Ads to distribute…

How to Prevent Cross-Site Scripting (XSS) Attacks

Cross-site scripting attacks (XSS) are used to steal data and hijack browsing sessions so attackers can take action on a victim’s behalf. Attackers may use this opportunity to alter web pages, post on social accounts, initiate bank transfers or make…

Cybercriminals Use VSCode Extensions as New Attack Vector

Microsoft’s Visual Studio Code integrated development environment (IDE) is used by as much as 75% of developers, so any security issue has widespread implications. And Aqua Nautilus researchers have discovered a big one. The researchers reported earlier this month that…

10 Best Open-Source Vulnerability Scanners for 2023

Vulnerability assessment tools scan assets for known vulnerabilities, misconfigurations, and other flaws. These scanners then output reports for IT security and application development operations (DevOps) teams that feed prioritized tasks into ticketing and workflow systems for remediation. Open source vulnerability…

13 Best Intrusion Detection and Prevention Systems (IDPS)

Intrusion detection systems (IDS) and intrusion prevention systems (IPS) – often combined as intrusion detection and prevention (IDPS) – have long been a key part of network security defenses for detecting, tracking, and blocking threatening traffic and malware. With the…

20 Top Cybersecurity Companies for 2023

As the demand for robust security defense grows, the market for cybersecurity technology has exploded, as have the number of available solutions. To help you navigate this growing market, we provide our recommendations for the world’s leading cybersecurity technology providers,…

ChatGPT’s Dark Side: An Endless Supply of Polymorphic Malware

CyberArk researchers are warning that OpenAI’s popular new AI tool ChatGPT can be used to create polymorphic malware. “[ChatGPT]’s impressive features offer fast and intuitive code examples, which are incredibly beneficial for anyone in the software business,” CyberArk researchers Eran…

16 Best Digital Forensics Tools & Software

For everything from minor network infractions to devastating cyberattacks and data privacy troubles, digital forensics software can help clean up the mess and get to the root of what happened. Since the inception of data forensics almost forty years ago, methods…

Cybersecurity in the Metaverse Will Require New Approaches

Despite challenges faced by Meta and others, there remains optimism for the metaverse. The PwC 2022 U.S. Business and Consumer Metaverse Survey highlights this. The survey, which included over 5,000 consumers and 1,000 U.S. business leaders, shows that half of…

16 Best Digital Forensics Tools & Software

The post 16 Best Digital Forensics Tools & Software appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original article: 16 Best Digital Forensics Tools & Software

5 Trends in Patch Management

The post 5 Trends in Patch Management appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original article: 5 Trends in Patch Management

Best Internet Security Software & Suites

The post Best Internet Security Software & Suites appeared first on eSecurityPlanet. This article has been indexed from eSecurityPlanet Read the original article: Best Internet Security Software & Suites

12 Top Vulnerability Management Tools for 2023

Vulnerability management tools go well beyond patch management and vulnerability scanning tools by discovering security flaws in network and cloud environments and prioritizing and applying fixes. Many IT departments struggle to stay on top of security vulnerabilities, and many don’t…

Rackspace Breach Linked to New OWASSRF Vulnerability

Rackspace has acknowledged that it was hit by the Play ransomware a month ago in an attack that compromised customers’ Microsoft Exchange accounts. The attackers apparently leveraged a zero-day vulnerability called OWASSRF that was recently analyzed by CrowdStrike. In an…

The 22 Best Vulnerability Scanner Tools for 2023

Vulnerability scans play a critical role in protecting assets from attacker exploitation by identifying missing updates, misconfigurations, and other common security issues. Originally designed to test local networks and devices, vulnerability scanning tools have evolved to encompass the modern IT…

Security Outlook 2023: Cyber Warfare Expands Threats

After a year that saw massive ransomware attacks and open cyber warfare, the biggest question in cybersecurity for 2023 will likely be how much of those attack techniques get commoditized and weaponized. “In 2022, governments fought wars online, businesses were…