security
The Single Sign-On Multi-Factor portal for web apps, now OpenID Certified™ - authelia/authelia
Scan MCP Servers for vulnerabilities. Contribute to cisco-ai-defense/mcp-scanner development by creating an account on GitHub.
Since its founding, the Sysdig Threat Research Team (TRT) has been committed to making the world a safer, more informed place. Upholding this commitment
Pen-testing tool aims to protect network access points against a host of threats.
Internet Archive's "The Wayback Machine" has suffered a data breach after a threat actor compromised the website and stole a user authentication database containing 31 million unique records.
Meet your favorite 2FA app. We are an open-source, community-driven, private and simple solution for Internet's biggest threat - security breaches.
Purple Knight, built by Semperis, is the top Active Directory security assessment tool today. Identify threats and get prioritized guidance.
Lightweight, container-free sandbox for running commands with network and filesystem restrictions - Use-Tusk/fence
Jon DiMaggio used sockpuppet accounts, then his own identity, to infiltrate LockBit and gain the trust of its alleged admin, Dmitry Khoroshev.
Spotify recently introduced its security vulnerability management platform, Kitsune. Right from vulnerability detection to providing insights based on metrics, Kitsune manages the overall security vul
Follow these best practices for using AWS Identity and Access Management (IAM) to help secure your AWS account and resources.
RTL-SDR brought cheap and ubiquitous Software Defined Radio (SDR) to the masses, opening up whole swaths of the RF spectrum which were simply unavailable to the average hacker previously. Because t…
Welcome back to Week in Review. This week, we're coming at you right off the heels of TechCrunch Disrupt! If you missed it, we’re highlighting
Here, you'll find a list of free, open-source cybersec tools that are ready to be added to your organization's arsenal.
Turning Outlook into a keylogger via VBA macros