Learn how to turn a Raspberry Pi into a custom router to bypass ISP restrictions, protect your privacy, and secure your internet connection.
SonicWall breach exposed backup files of under 5% customers, prompting password resets to prevent firewall exploitation.
An open source software supply-chain vulnerability is an exploitable weakness in trusted software caused by a third-party, ...
The XZ attack is a backdoor that reminds us our biggest open-source security threats are from decades of unlearned lessons.
Home Assistant is an open-source smart home platform. It’s a local server-based solution that runs on almost anything. It ...
You can create a release to package software, along with release notes and links to binary files, for other people to use. Learn more about releases in our docs.
A lightweight, Docker-based VPN solution that leverages SSH tunneling to create secure VPN connections. This project provides an isolated SSH server environment that enables clients to establish TUN ...
Cisco warned customers today to patch two zero-day vulnerabilities that are actively being exploited in attacks and impact ...
Researchers call it an evolution from earlier versions and not a leap forward, but still advise CSOs to better secure ESXi ...
Backdoor on edge devices allowed a starting point for threat actors to use lateral movement to access VMware vCenter and ESXi ...
Cisco faces two zero-day attacks actively exploiting flaws in ASA and IOS/IOS XE devices. Learn about the vulnerabilities and ...