TOPICS / Network Security
Network Security
Map, analyze, and defend networks and infrastructure.
Network security starts with knowing your own attack surface — addresses, open ports, DNS, and devices — and recognizing the protocols attackers abuse for C2 and lateral movement.
These calculators and lookups speed up everyday network and DFIR work.
Free tools
Latest coverage
- CISA Contractor Leaked AWS GovCloud Keys on GitHub for Six Months
- Ghostwriter Deploys Prometheus Phishing Lures Against Ukraine Government Entities
- Screening Serpens: Iranian APT Fuses AppDomainManager Hijacking with New RATs in 2026 Espionage Campaign
- CVE-2026-9082: Critical Drupal SQL Injection Under Attack on Thousands of Sites
- CVE-2026-20182: Cisco Catalyst SD-WAN CVSS 10.0 Auth Bypass Actively Exploited
- Kali365 PhaaS Kit Bypasses Microsoft 365 MFA via Device Code Phishing — FBI Warning
- Megalodon: Supply Chain Attack Backdoors 5,561 GitHub Repos in Six Hours via CI/CD Workflow Injection
- Stolen Gemini API Keys and AI Fraud: How 'Quantum Patriot' Drained Crypto Wallets via Fake QAnon Content