The Hacker News Logo
Subscribe to Newsletter

The Hacker News - Cybersecurity News and Analysis: cyber security software

Latest Kali Linux OS Added Windows-Style Undercover Theme for Hackers

Latest Kali Linux OS Added Windows-Style Undercover Theme for Hackers

November 27, 2019Wang Wei
You can relate this: While working on my laptop, I usually prefer sitting at a corner in the room from where no one should be able to e...
Company Detected Years-Long Breach Only After Hacker Maxed Out Servers' Storage

Company Detected Years-Long Breach Only After Hacker Maxed Out Servers' Storage

November 14, 2019Wang Wei
What could be even worse than getting hacked? It's the "failure to detect intrusions" that always results in huge losses...
Hackers Breach ZoneAlarm's Forum Site — Outdated vBulletin to Blame

Hackers Breach ZoneAlarm's Forum Site — Outdated vBulletin to Blame

November 11, 2019Swati Khandelwal
ZoneAlarm, an internet security software company owned by Israeli cybersecurity firm Check Point Technologies, has suffered a data breach ...
Breaches are now commonplace, but Reason Cybersecurity lets users guard their privacy

Breaches are now commonplace, but Reason Cybersecurity lets users guard their privacy

October 09, 2019The Hacker News
There has been no shortage of massive security breaches so far this year. Just last July, Capital One disclosed that it was hit by a brea...
CISO Kit — Breach Protection in the Palm of Your Hand

CISO Kit — Breach Protection in the Palm of Your Hand

September 11, 2019The Hacker News
CISOs and CIOs need to know better than anyone the security pulse of their organizations. On the other hand, they cannot be flooded with eve...
New Free Offering Enables Any MSP and Security Integrator to Add Incident Response to their Services Portfolio

New Free Offering Enables Any MSP and Security Integrator to Add Incident Response to their Services Portfolio

September 04, 2019The Hacker News
The Incident Response (IR) services market is in accelerated growth due to the rise in cyberattacks that result in breaches. More and mor...
5 Cybersecurity Tools Every Business Needs to Know

5 Cybersecurity Tools Every Business Needs to Know

May 23, 2019The Hacker News
Cybersecurity experts all echo the same thing – cyber attacks are going to get more rampant, and they will continue to pose severe threats a...
Cynet's Free Incident Response Tool — Stop Active Attacks With Greater Visibility

Cynet's Free Incident Response Tool — Stop Active Attacks With Greater Visibility

May 07, 2019The Hacker News
The saying that there are two types of organizations, those that have gotten breached and those who have but just don't know it yet, h...
NSA Releases GHIDRA Source Code — Free Reverse Engineering Tool

NSA Releases GHIDRA Source Code — Free Reverse Engineering Tool

April 04, 2019Swati Khandelwal
Update (4/4/2019) — Great news. NSA today finally released the complete source code for GHIDRA version 9.0.2 which is now available o...
Cynet Offers Free Threat Assessment for Mid-Sized and Large Organizations

Cynet Offers Free Threat Assessment for Mid-Sized and Large Organizations

April 03, 2019The Hacker News
Visibility into an environment attack surface is the fundamental cornerstone to sound security decision making. However, the standard pr...
How Endpoint Management Can Keep Workplace IT Secure

How Endpoint Management Can Keep Workplace IT Secure

April 01, 2019The Hacker News
Workplaces have become highly connected. Even a small business could have dozens of devices in the form of desktops, mobile devices, route...
Advanced Breach Protection Demystified – Untold Truths On Security Beyond AV

Advanced Breach Protection Demystified – Untold Truths On Security Beyond AV

March 28, 2019The Hacker News
Doing business in today's connected world means dealing with a continually evolving threat landscape. With potential losses due to ...
Get 4 Essential CyberSecurity Software For Less Than $10 Per Month

Get 4 Essential CyberSecurity Software For Less Than $10 Per Month

March 22, 2019The Hacker News
Major data breaches and cyber attacks are occurring at an alarming rate, and if you are still not using a VPN and password manager app, y...
Google Launches Backstory — A New Cyber Security Tool for Businesses

Google Launches Backstory — A New Cyber Security Tool for Businesses

March 05, 2019Swati Khandelwal
Google's one-year-old cybersecurity venture Chronicle today announced its first commercial product, called Backstory , a cloud-based ...
Why you need to know about Penetration Testing and Compliance Audits?

Why you need to know about Penetration Testing and Compliance Audits?

November 15, 2018Wang Wei
We live in an age where data flows like water, becoming the new life source of our everyday ventures. As such, you can just imagine what a...
Exclusive Deals

Cybersecurity Newsletter — Stay Informed

Sign up for cybersecurity newsletter and get latest news updates delivered straight to your inbox daily.