Showing posts with label Tools. Show all posts
Showing posts with label Tools. Show all posts

Tuesday 19 September 2023

Cybersecurity Technologies and Projects


Cybersecurity is the activity of defending a business's data or information against online criminals. Attackers are giving up the conventional or outdated techniques of getting data from customers as the world adjusts to the new reality. They are adjusting to new technologies and techniques that can be used to steal data electronically. Cyber attackers try to get into the network and launch an attack, while cyber defenders try to block or stop the attackers from accessing their data. This is a game of cat and mouse in the world of cyber security. But instead of using physical weapons, these conflicts make use of a variety of the greatest cyber security tools. The same tool can be used in both positive and bad ways.

The significance of cybersecurity can be understood through Mimecast's study. According to the research, there has been a 26% increase in ransomware, an 88% increase in email-based spoofing, and a 67% increase in impersonation fraud.

The following is a list of cybersecurity technologies and projects that could help in resolving modern security issues:

1. NETWORK ANALYSIS
  1. Wireshark: https://www.wireshark.org
  2. pfSense: https://www.pfsense.org
  3. Arkime: https://arkime.com
  4. Snort: https://www.snort.org
  5. Suricata: https://suricata.io/

2. OS ANALYSIS
  1. Helk: https://github.com/Cyb3rWard0g/HELK
  2. Volatility: https://github.com/volatilityfoundation/volatility/
  3. RegRipper: https://github.com/keydet89/RegRipper3.0
  4. OSSEC: https://www.ossec.net
  5. osquery: https://osquery.io

3. INCIDENT MANAGEMENT
  1. TheHive: https://thehive-project.org/
  2. GRR Rapid Response: https://github.com/google/grr

4. HONEYPOTS
  1. Kippo: https://github.com/desaster/kippo
  2. Cowrie: https://github.com/cowrie/cowrie
  3. Dockpot: https://github.com/eg-cert/dockpot
  4. HonSSH: https://github.com/tnich/honssh

5. THREAT INTELLIGENCE
  1. Misp: https://www.misp-project.org/
  2. MSTICPy: https://github.com/microsoft/msticpy
  3. Threatpost: https://threatpost.com/
  4. Dark Reading: https://www.darkreading.com/
6. EDR
  1. Cortex XDR: https://www.paloaltonetworks.es/resources/datasheets/cortex-xdr
  2. Cynet 360: https://www.cynet.com/platform/
  3. FortiEDR: https://www.fortinet.com/lat/products/endpoint-security/fortiedr
  4. Xcitium: https://www.xcitium.com/free-edr/
7. SIEM
  1. OSSIM: https://cybersecurity.att.com/products/ossim
  2. Splunk: https://www.splunk.com
  3. LogRhythm: https://logrhythm.com
  4. Wazuh: https://wazuh.com
  5. Qradar: https://www.ibm.com/community/qradar/ce/

FREE Cybersecurity Certifications

Here's 15 FREE courses provided by the Qualys. The cybersecurity firm Qualys focuses on providing cloud-based security and compliance so...