3 Common Threats to Look for in Your Network Data
Continuously monitoring your network activity for signs of attack is a great way to catch hackers and breaches before they...
Continuously monitoring your network activity for signs of attack is a great way to catch hackers and breaches before they...
By Alexander Elkholy (Threats Analyst) A root privilege escalation and remote execution vulnerability (designated as CVE-2020-8794) has been discovered in...
Cyberattackers continue to seize on the dire need for information surrounding the novel coronavirus. In one of the latest examples,...
Ironically, to keep costs low for their enterprise and mid-market clients, managed service providers (MSPs) are some of the most...
The Federal Bureau of Investigation arrested a Russian citizen who allegedly supported the sale of hacked accounts and personal data...
According to Microsoft, the company was part of a team that took down the global network of zombie bots. Necurs...
As a module-based malware, Trickbot a malware family previously captured by FortiGuard Labs and afterward analyzed in 2016. It can...
Google has stopped advising Microsoft Edge users to switch to Chrome for a more secure experience as the browser extensions...
RedRabbit is a PowerShell script aimed at helping pentesters conduct ethical hacking #RedTeam To Run: You can either run locally...
Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order...
In a survey conducted by the Ponemon Institute and Domain Tools, 51% of respondents said they believe that automation will...
By Jaromir Horejsi and Joseph C. Chen (Threat Researchers) We recently discovered a new campaign that we dubbed “Operation Overtrap”...
Following the unexpectedly long list of fixes included in last month’s Patch Tuesday, March brings an even longer one, albeit...
Malicious actors have been secretly embedding the njRAT remote access trojan in free hacking tools as well as cracks of those...
Update: The digital certificate issued for httpsps has been revoked by GlobalSign. Fraudsters are known for using social engineering tricks...
According to Check Point Threat Intelligence, more than 4,000 coronavirus-related domains have been registered worldwide since January 2020. 3% of...
Earlier this year Cisco was in the headlines for the Zero-day vulnerabilities that were discovered in several of its devices...
According to an indictment in a court database, US authorities accuse Nikita Kislitsin, manager of a Russian cybersecurity company Group-IB,...
On Friday, The City of Durham, North Carolina suffered a cyberattack wherein Ryuk Ransomware crippled the city's IT systems and...
FuzzBench is a free service that evaluates fuzzers on a wide variety of real-world benchmarks, at Google scale. The goal...
This is an SSRF testing sheriff written in Go. It was originally created for the Uber H1-4420 2019 London Live...
Let's start off talking about CVE-2020-0688 from last month -- the Microsoft Exchange Validation Key RCE vulnerability. At the time...
In a recent episode of Rapid7’s podcast, Security Nation, we talked with Nick Percoco, the creator of Chicago-based security conference...
by: Magno Logan (Information Security Specialist) Discussions surrounding the Ghostcat vulnerability (CVE-2020-1938 and CNVD-2020-10487) found in Apache Tomcat puts it...