Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
12 Free, Ready-to-Use Security Tools
Threaded  |  Newest First  |  Oldest First
ronaldthomas
0%
100%
ronaldthomas,
User Rank: Apprentice
10/12/2018 | 9:49:17 AM
a
good post
rosiepage44
100%
0%
rosiepage44,
User Rank: Apprentice
10/13/2018 | 2:03:59 AM
Re: Pending Review
The security tools are the most important component of any system and those tools secure our data against any kind of scams over the system. There are several security tools available on the Internet and many of them are free. To get them all, consult with Microsoft Support Chat, it will help you to select the best option for your system. 
pheil300
100%
0%
pheil300,
User Rank: Apprentice
10/31/2018 | 9:26:46 PM
Re: Pending Review
I thought priorities were: People, Process then Products....in order. The best products in the world aren't going to help if you don't have the right people or the security/business processes to utilize them.
CallumLepide
50%
50%
CallumLepide,
User Rank: Apprentice
10/16/2018 | 6:11:37 AM
Free Tools
This article is absoultly right. IF you are unsure if you have a security threat in your system already but are low on budget. Download some free tools to help you find out where you need to direct fundsand see what solutions work best.

 

Its also a great way to trial a company's products and solution and to see how user friendly they are
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
10/26/2018 | 10:45:34 PM
Re: Free Tools
True, but it takes some vetting. Some of the free tools can be anxiety-inducing if they're offered by an independent developer or small organization with minimal rep. For a couple of free tools I use, I've had to do quite a bit of research just to make sure they were on the up and up -- when in the long run I might have been better off and more comfortable had they just asked to charge $10 to my credit card. ;)
RSR555
50%
50%
RSR555,
User Rank: Strategist
10/25/2018 | 9:33:33 AM
12 tools ??
Only 8 tools listed, what happened to the other 4?
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/25/2018 | 11:50:42 AM
Re: 12 tools ??
Looking into that! Stay tuned. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/25/2018 | 12:19:52 PM
Re: 12 tools ??
Headline is correct--There are 9 slides for each company but 12 tools mentioned in total! 
RicoF727
100%
0%
RicoF727,
User Rank: Apprentice
10/31/2018 | 11:23:42 AM
Here's the actual 12 tools
Here's the actual 12 tools

1.     Wombat Security - https://www.wombatsecurity.com/heroes

2.     https://www.wombatsecurity.com/bingo

3.     https://www.knowbe4.com/phishing-security-test-offer  -  lets companies run a simulated phishing test for up to 100 users. Within 24 hours, companies will receive a PDF with their phish-prone percentage and charts to share with management

4.     https://www.knowbe4.com/domain-doppelganger -  an option that KnowBe4 made available about two weeks ago. Participants will also receive a PDF within 24 hours of all their look-alike domains

5.     https://www.knowbe4.com/ransomware-simulator -  This tool simulates 13 ransomware infections and one cryptomining infection and will point out vulnerable workstations.

6.     https://erpmaestro.com/arm/?domain=erpmaestro.com - ERP Maestro, analyzes all existing insider threats within a company's SAP environment and issues monthly updates on the company's risk profile

7.     https://logrhythm.com/products/logrhythm-netmon-freemium/ - LogRhythm offers a free network analysis tool in which network managers can retain data for up to three days

8.     https://www.anomali.com/learn/staxx-access-stix-taxii-feeds - Anomali offers STAXX as a free client that lets users access any STIX/TAXII-compatible threat intelligence feed. STAXX supports STIX 1.0 and 2.0 standards, which are common languages for conveying data about threat intelligence

9.     https://www.neuralys.io/pricing -  The Neuralys platform offers a centralized dashboard for visualizing a company's vulnerability trends, security zoning for the prioritization of risk management tasks, and mitigation tracking for monitoring responses across a team's security operations.

a.    Neuralys can import/upload risks or vulnerabilities from existing security toolsets or penetration tests in seconds by using its native Nessus parser or the universal CSV importer

10.    Bizploit  - https://www.onapsis.com/research/free-solutions - Bizploit helps infosec pros with the discovery, exploration, vulnerability assessment, and exploitation phases of specialized SAP penetration testing

11.    Onapsis Integrity Analyzer - https://www.onapsis.com/research/free-solutions - The Integrity Analyzer for SAP was developed to help SAP customers protect their systems from unauthorized modifications of ABAP programs

12.   https://detexian.com/ -  Detexian has created a B2B SaaS product for small and midsize businesses that offers 24/7 threat detection.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41393
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.
CVE-2021-41394
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations.
CVE-2021-41395
PUBLISHED: 2021-09-18
Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username.
CVE-2021-3806
PUBLISHED: 2021-09-18
A path traversal vulnerability on Pardus Software Center's "extractArchive" function could allow anyone on the same network to do a man-in-the-middle and write files on the system.
CVE-2021-41392
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.