PacketNut; Confessions of an Enterprise Information Security Architect

A blog for Security Architects, CISOs and anyone else responsible for protecting their organisation's information assets

Useful Info

  • Home
  • Companies that interest me

Thursday, 6 September 2018

125 Security Tools

Excellent link to the best security tools, by NMAP.

https://sectools.org


Posted by Tony Brown at 06:43 No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Security News

  • Latest topics for ZDNet in Security
    Cisco patches a couple of root access-granting security flaws
    2 hours ago
  • Graham Cluley
    Smashing Security #116: Stalking debtors, Facebook farce, and a cyber insurance snag
    2 hours ago
  • Dark Reading:
    Insurer Offers GDPR-Specific Coverage for SMBs
    2 hours ago
  • Techdirt.
    One Of The People Suing Fortnite Over 'Stolen' Dance Steps Gets His Dance Rejected By The US Copyright Office
    2 hours ago
  • Security Boulevard
    Nest Secure Users Learn of Secret Microphone | Avast
    3 hours ago
  • Cisco Blog
    HyperFlex Gets Edgy, a Cisco Champion Radio Podcast (S6|Ep.4)
    3 hours ago
  • Hacker Combat - Cyber Security and Hacking News | HackerCombat
    Why Disable SSDP/UPnP In Today’s Home And Enterprises?
    3 hours ago
  • The Register - Security
    No RESTful the wicked: If your website runs Drupal, you need to check for security updates – unless you enjoy being hacked
    3 hours ago
  • Latest news and stories from BleepingComputer.com
    Windows 10 Insider Preview Build 18342 Released With Numerous Improvements
    3 hours ago
  • Cybercrime | The Guardian
    Toyota Australia says no customer data taken in attempted cyber attack
    3 hours ago
  • SecurityWeek RSS Feed
    Canada Helping Australia Determine 'Full Extent' of Hack
    4 hours ago
  • Threatpost | The first stop for security news
    Researcher: Not Hard for a Hacker to Capsize a Ship at Sea
    4 hours ago
  • News – SC Media
    30 years in: My, how SC and security have changed
    5 hours ago
  • CSO Online
    IoT botnets target enterprise video conferencing systems
    7 hours ago
  • Computer Business Review
    Google Releases “Cloud Services Platform” Beta
    8 hours ago
  • Light Reading:
    Huawei Bullish on Better Carrier Sales Growth in 2019
    9 hours ago
  • RSA Conference Blog
    Looking back at RSAC 2018: Security Strategy & Operations
    9 hours ago
  • Motherboard US - Hacking US
    PayPal Processes Payments for ‘Stalkerware’ Software Sold to Abusive Partners
    9 hours ago
  • DDoS Attacks
    4 Promising Use Cases Of Blockchain In Cybersecurity
    10 hours ago
  • IT SECURITY GURU
    Servers, Endpoints And Networks Under Control With Baramundi And Paessler.
    10 hours ago
  • SearchSecurity: Security Wire Daily News
    ConnectWise plugin flaw exploited in ransomware attacks on MSPs
    11 hours ago
  • Cybersecurity
    Russia bans soldiers from using smartphones to prevent tracking of military
    11 hours ago
  • Schneier on Security
    Details on Recent DNS Hijacking
    12 hours ago
  • Security Intelligence
    Calling Into Question the CVSS
    15 hours ago
  • ComputerWeekly: IT security
    Breaking the chains: How FUD is holding the cyber sector hostage
    17 hours ago
  • Risky Business
    Risky Business #531 -- Australia's political parties targeted, the Witt indictment and more
    1 day ago
  • The Hacker News
    Critical Flaw Uncovered In WordPress That Remained Unpatched for 6 Years
    1 day ago
  • Ars Technica » Risk Assessment
    Mandatory update coming to Windows 7, 2008 to kill off weak update hashes
    1 day ago
  • Infosecurity Europe Blog
    Infosecurity Magazine takes over Infosecurity North America 2018
    1 day ago
  • IBTimes.co.uk : Technology
    Russia's RT slams Facebook for suspending anti-US, pro-Kremlin viral video channels
    1 day ago
  • Softpedia News / Security
    Mozilla Firefox Will Warn Users When They Visit Hacked Websites
    1 day ago
  • Krebs on Security
    A Deep Dive on the Recent Widespread DNS Hijacking Attacks
    2 days ago
  • Daniel Miessler
    The Rise of the Corporate Technology Ecosystem (CTE)
    3 days ago
  • Troy Hunt
    Weekly Update 126
    4 days ago
  • Latest Security Articles from ComputerworldUK
    5G is "not the atom bomb" says Huawei rotating chairman Eric Xu
    1 week ago
  • EFF Press Releases
    Hearing Wednesday: EFF Asks Court to Unseal Phone Tap Order That Was Among Hundreds of Questionable Wiretaps Approved By California Court
    1 week ago
  • Errata Security
    How Bezo's dick pics might've been exposed
    1 week ago
  • Bad Packets Report
    Over 9,000 Cisco RV320/RV325 routers are vulnerable to CVE-2019-1653
    3 weeks ago
  • NCSC Site
    Cyber security for major events
    1 month ago
  • US-CERT Tips
    ST18-007: Questions Every CEO Should Ask About Cyber Risks
    2 months ago
  • CRN
    WATCH: Digital Guardian Exec On How Its Move To The Cloud Benefits Partners
    6 months ago
  • Forbes - Security
    Pentagon Bans GPS Fitness Apps, Says They're 'Significant Risk' To Troops
    6 months ago
  • SecurityRoundTable.org
    Why A ‘Cloud Architect’ Should Be on Your Hiring Agenda
    9 months ago
  • WIRED » Threat Level
    Feds Charge NSA Contractor Accused of Exposing Russian Hacking
    1 year ago
  • Security | The Silicon Review
    Is it true that internet has penetrated only to handful of the Indian population?!
    2 years ago
  • Latest articles from SC Magazine UK
    400% increase in POS malware variants across US Thanksgiving weekend
    2 years ago
  • Blog - devsecops
    DevSecOps is the Krav Maga of Security
    2 years ago
Show 10 Show All

Vendors

  • Naked Security
    Can you really sniff out gas station card skimmers with your phone?
    4 hours ago
  • Tenable Blog
    Highly Critical Drupal Security Advisory Released (SA-CORE-2019-003)
    4 hours ago
  • Palo Alto Networks Blog
    CYBERFORCE Profile Series: Scoring Big as a Trusted Advisor to Customers
    5 hours ago
  • Malwarebytes Unpacked
    Sophisticated phishing: a roundup of noteworthy campaigns
    7 hours ago
  • Recorded Future
    The Elephant in the Room: A Holistic View of Third-Party Risk
    7 hours ago
  • Rapid7 Blog
    [IoT Security] Introduction to Embedded Hardware Hacking
    7 hours ago
  • Skybox Security Blog – Cybersecurity from The Skybox View
    OT Networks Saw Attacks Continue to Rise in 2018
    8 hours ago
  • CloudFlare
    Join us for 5 serverless events in SF Bay Area this week
    9 hours ago
  • Anomali Blog
    Weekly Threat Briefing: Chinese Facial Recognition Database Exposes 2.5m People
    10 hours ago
  • Check Point Blog
    Report: Cloud, Mobile and IoT as Weakest Links
    12 hours ago
  • AlienVault Blogs
    Securing People
    12 hours ago
  • TrendLabs Security Intelligence Blog
    Monero Miner-Malware Uses RADMIN, MIMIKATZ to Infect, Propagate via Vulnerability
    13 hours ago
  • We Live Security » Languages » English
    Siegeware: When criminals take over your smart building
    16 hours ago
  • Varonis Blog
    Group Policy Editor Guide: How to Configure and Use
    1 day ago
  • SentinelOne
    7 Reasons to Move Away from Legacy AV
    1 day ago
  • Carbon Black
    Partner Perspectives: Optimize your Case Management with CB Defense and Swimlane
    1 day ago
  • CyberArk
    New DevOps eBook: Managing Application Secrets – What Do Developers Really Want?
    1 day ago
  • Packet Pushers - Briefings In Brief
    Tech Bytes: Thousand Eyes Shares Lessons Learned From A CenturyLink Outage (Sponsored)
    2 days ago
  • AWS Security Blog
    How to visualize Amazon GuardDuty findings: serverless edition
    2 days ago
  • Darktrace Blog
    Catching Mimikatz’ behavior with anomaly detection
    5 days ago
  • Darktrace Blog
    Catching Mimikatz’ behavior with anomaly detection
    5 days ago
  • Centrify Cloud Service Status - Incident History
    Centrify Cloud Service Advisory - SMS Delivery delays or failure
    6 days ago
  • Preempt Blog
    Cybersecurity Science Project or Immediate Value: Which Do You Prefer?
    6 days ago
  • The Akamai Blog
    3 Reasons Your Business Needs Security at the Edge
    6 days ago
  • Zscaler Research
    Demystifying the Crypter Used in Emotet, Qbot, and Dridex
    6 days ago
  • blog.trendmicro.co.uk
    Breaches Galore in 2019 Require a Multi-Layered Response
    1 week ago
  • Imperva Cyber Security Blog
    How Imperva’s New Attack Crowdsourcing Secures Your Business’s Applications
    1 week ago
  • TaoSecurity
    Ntopng on Security Onion
    1 week ago
  • Errata Security
    How Bezo's dick pics might've been exposed
    1 week ago
  • Arbor Networks Threat Intelligence
    IoT Exploits: Around The World In 120 Days
    1 week ago
  • ClearSky Cybersecurity
    Year of the Dragon – Summary report of cyber events for 2018
    2 weeks ago
  • Cisco Blog » Security
    Threat Roundup for Jan. 25 to Feb. 1
    2 weeks ago
  • Cisco Blog » Threat Research
    Threat Roundup for Jan. 25 to Feb. 1
    2 weeks ago
  • ThreatConnect | Enterprise Threat Intelligence Platform
    Playbook Fridays: Query Cymon.io API
    2 weeks ago
  • Threat Research
    APT39: An Iranian Cyber Espionage Group Focused on Personal Information
    3 weeks ago
  • Heimdal Security Blog
    Security Alert: Danish E-Shoppers Targeted by Another Wave of Nets.eu Phishing Campaign
    3 weeks ago
  • Securosis Highlights
    The ELEVENTH Annual Disaster Recovery Breakfast: Is that you Caesar?
    3 weeks ago
  • Postmodern Security
    DevSecOps Myths
    3 weeks ago
  • Fooling the Interpreter
    Advanced JavaScript Injections
    2 months ago
  • Liquidmatrix Security Digest
    Having The Security Rug Pulled Out From Under You
    4 months ago
  • Network Security Blog
    Lucky Break
    5 months ago
  • Threat Intelligence
    Lojack Becomes a Double-Agent
    9 months ago
  • Fortinet Blog
    Securing the Network: What Three Key Verticals Require
    11 months ago
  • CipherCloud
    Multi-Cloud Data Protection – A Cloud Security Must Practice
    1 year ago
  • Cyphort
    Equifax Breach: The News We All Dreaded to Hear.
    1 year ago
  • Speaking of Security - The RSA Blog and Podcast
    A Security Decision – Build or Buy
    1 year ago
  • Metasploit
    Metasploit Wrapup
    1 year ago
  • Inside The Threat Blog by Lancope
    Our ongoing transition into Cisco Security
    1 year ago
  • Threat Geek
    Reducing Detection from Months to Minutes: Detecting Credentials in the Clear
    1 year ago
  • Lockheed Martin Cybersecurity Blog
    How Threat Intelligence Can Increase an Organization’s Cybersecurity Maturity
    2 years ago
  • iSIGHT Partners
    ThreatScape Media Highlights Update – Week Of June 8th
    2 years ago
  • LogRhythm: The Dialog - The Security Intelligence Company
    Getting Started with Threat Intelligence
    3 years ago
  • IBM Internet Security Systems Internet Threat Information
    Multiple Adobe Flash Player code execution vulnerabilities
    4 years ago
  • Our Blog | Core Security
  • Comments on: The Top 10 AlgoSec Blog Posts From 2018
  • Farsight Security Blog
  • Trustwave Newsroom
  • Cylance Blog
Show 10 Show All

Blog Archive

  • ►  2019 (16)
    • ►  February (2)
    • ►  January (14)
  • ▼  2018 (4)
    • ►  December (2)
    • ▼  September (1)
      • 125 Security Tools
    • ►  April (1)
  • ►  2017 (6)
    • ►  August (5)
    • ►  July (1)
  • ►  2016 (1)
    • ►  January (1)
  • ►  2015 (4)
    • ►  September (4)
  • ►  2013 (3)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)

About Me

Tony Brown
Enterprise Security Solutions Architect at global service provider. CCIE #8767. CISSP. Chartered Engineer. MSc. in Information Security. CCDE 2011:6 Chartered IT Professional. Member of the Institute of Information Security Professionals. Blah blah blah
View my complete profile
Awesome Inc. theme. Powered by Blogger.