The number of vulnerable computers in Russia tripled during the period of self-isolation
DeviceLock analysts claim that the number of computers with the Windows operating system in Russia, that are vulnerable to Remote...
DeviceLock analysts claim that the number of computers with the Windows operating system in Russia, that are vulnerable to Remote...
Ransomware are soon becoming the most feared disease of cyber-world, started from simple encryption of the victim's computer and files,...
This tool can scan websites with open .git repositories for Bug Hunting/ Pentesting Purposes and can dump the content of...
By Jessie Huang (Mobile Threats Analyst) We recently saw two barcode reader apps in Google Play, together downloaded more than...
Researchers have uncovered a new “enterprise-grade” backdoor malware program that they say shares code with the notorious modular banking trojan...
My name is Scott King, and I am the Senior Director of Advisory Services at Rapid7. Before that, I was...
The script aims to help in classifying vulnerabilities in web applications. The methodology RecoX is arising can spot weaknesses other...
Is it legal to buy stolen data from criminals? In most countries the answer would be no. But will it...
This post was authored by Hossein Jazi and Jérôme Segura On May 29th, we identified an attack that we believe...
Experts commented on the release of the report of independent public organizations "Information fight against Russia: constructing the image of...
Due to a recent increase in device hacks, Google has decided to strengthen up its Nest security protections. The Nest...
The russia-linked APT group have been running campaigns wherein the authors exploited a critical vulnerability (CVE-2019-10149), also called as "The...
A JavaScript components vulnrability scanner, based on RetireJS.Why use JShole instead of RetireJS?By default, RetireJS only searches one page, but...
GitMonitor is a Github scanning system to look for leaked sensitive information based on rules. I know that there are...
In a recent session of our Accelerate Threat Detection and Response with SIEM + SOAR webcast series, Rapid7 product leaders...
“Hey Joe, I wanted to remind you that starting next Monday you will be expected to teach from home. The...
Games consoles and handhelds have always been an interesting battleground for hacking activities. The homebrew scene for using hardware in...
What was once a simple piece of malware discovered just 20 years ago this month exhibited its capacity which transformed...
Key findings While investigating attacks related to a group named Cycldek post 2018, we were able to uncover various pieces...
Technology is what is saving us from a complete change in the way of life in a world of a...
Win python script to inject Macro and DDE code into Excel and Word documents (reverse shell)Features:Inject malicious Macro on formats:...
Ligolo is a simple and lightweight tool for establishing SOCKS5 or TCP tunnels from a reverse connection in complete safety...
This post is part one of a two-part blog series on policy customization in InsightVM.To properly guard against security threats,...
It has been shocking for many people in the United States and around the world to see the stark racial...