Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Netsec Goggle Customizes Brave Search Results to Show Only Cybersecurity Websites

Cybersecurity consulting firm Forces Unseen has developed a “Goggle” for the Brave search engine that allows users to obtain results only from cybersecurity websites.

Cybersecurity consulting firm Forces Unseen has developed a “Goggle” for the Brave search engine that allows users to obtain results only from cybersecurity websites.

The developers of the privacy-focused Brave web browser announced recently the introduction of a new beta feature for the Brave search engine that enables users to customize their search results using so-called Goggles.

Anyone can create a Goggle that essentially serves as a custom re-ranking mechanism that sits on top of Brave’s search index.

Forces Unseen has created a Goggle that shows only search results from a list of a few thousand cybersecurity websites.

The Netsec Goggle, which is available as open source on GitHub, displays results from a list of sites generated by taking URLs with a score of 20 or higher from the /r/netsec community on Reddit.

The Goggle searches more than 3,700 websites and it’s currently being updated manually, but Forces Unseen says it plans on automating the process. The list excludes the top 1,000 domains, including google.com, facebook.com, youtube.com and microsoft.com.

The Netsec Goggle searches cybersecurity news websites (including SecurityWeek), the sites and blogs of cybersecurity organizations, and independent research blogs.

Brave search results via Netsec Goggle

“We were really curious if this could help us to break through all the SEO spam and garbage on the internet and help us be more productive in the information security space,” the developers of the Netsec Goggle explained. “As a starting point we used submissions from /r/netsec to build this Goggle. We intend to incorporate additional sources that give us a strong signal/noise ratio.”

Advertisement. Scroll to continue reading.

Related: Aqua Security Ships Open Source Tool for Auditing Software Supply Chain

Related: GitLab Releases Open Source Tool for Hunting Malicious Code in Dependencies

Related: Target Open Sources Web Skimmer Detection Tool

Related: Microsoft Releases Open Source Tool for Securing MikroTik Routers

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...