Rapid7’s Full Stack Vulnerability Risk Management Portfolio Recognized for Application Security Capabilities
Many businesses rely on web applications for their success. Because of this, web applications are also perfect targets for attackers....
Many businesses rely on web applications for their success. Because of this, web applications are also perfect targets for attackers....
A long-running malware campaign whose activity dates back to 2016 has been using a sophisticated playbook of tricks to sneak...
Virtual private networks (VPNs) have been growing in popularity for the last three years, a notable trend revealed in a...
According to F5's cybersecurity agency's report published recently, the financial sector has been a victim of severe credential stuffing attacks...
A malware that attacks Android smartphones has increased its Maas (malware-as-a-service) operations with file encryption capabilities to carry out ransomware...
With the spread of COVID-19, organizations worldwide have introduced remote working, which is having a direct impact on cybersecurity and...
Elemental is a centralized threat library of MITRE ATT&CK techniques, Atomic Red Team tests, and over 280 Sigma rules. It...
(Rogue Office 365 and Azure (active) Directory tools)ROADtools is a framework to interact with Azure AD. It currently consists of...
A GitHub user claiming to represent the authors of the Troldesh Ransomware calling themselves the “Shade team” published this statement...
As it becomes clear that some things will never again be the same after the global coronavirus pandemic, it is...
According to recent reports, China is alleged for surveilling its residents' homes among the coronavirus epidemic. However, there is no...
In July 2019, Dr. Web reported about a backdoor trojan in Google Play, which appeared to be sophisticated and unlike...
Terrier is a Image and Container analysis tool that can be used to scan OCI images and Containers to identify...
wxHexEditor is another Free Hex Editor, build because there is no good hex editor for Linux system, specially for big...
Over the past few years, we have continued to see our customers embrace the cloud. There are many driving factors...
For years now, we have been told that when disposing of desktops, laptops, servers, and printers, we need to watch...
The cloud has become the standard for data storage. Just a few years ago, individuals and businesses pondered whether or...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...
SeaChange, a leading supplier of video delivery software solutions has been attacked by the authors of Sodinokibi ransomware. Reportedly, the...
Messaging application Telegram announces the development of a group video calling service along with the news that it has now...
Sophos, a UK cybersecurity company famous for its anti-virus products has released an emergency security update this Saturday to combat...
What is a ransomware?A ransomware is malware that encrypts all your files and shows a ransom request, which tells you...
Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.Nuclei is...
What’s up?On April 22, Sophos received a report documenting a suspicious field value visible in the management interface of an...