Zoomed In: A Look into a Coinminer Bundled with Zoom Installer
By Raphael Centeno and Llallum Victoria Many companies around the world have transitioned to work-from-home arrangements because of growing concerns...
By Raphael Centeno and Llallum Victoria Many companies around the world have transitioned to work-from-home arrangements because of growing concerns...
It’s almost impossible not to rely on social networks in some way, whether for personal reasons or business. Sites such...
New data by researchers has demonstrated that cybercriminals are preying on people's concerns regarding the COVID-19 pandemic and carrying out...
Following a recent disclosure about Iranian hackers targeting on vulnerabilities in VPN servers like the Pulse Secure, Palo Alto Systems,...
Tweetshell is an Shell Script to perform multi-threaded brute force attack against Twitter, this script can bypass login limiting and...
Jackdaw is here to collect all information in your domain, store it in a SQL database and show you nice...
By David Fiser (Security Researcher) We discovered 8,000 Redis instances that are running unsecured in different parts of the world,...
Armenian President Armen Sarkisian signed the bill on amendments to the law "on the legal regime of emergency" and "on...
Cyber-security is an important concern for everyone working from these days, amid the lock-down due to the current Coronavirus pandemic....
The previous story described an unusual way of distributing malware under disguise of an update for an expired security certificate....
This experimental fuzzer is meant to be used for API in-memory fuzzing.The design is highly inspired and based on AFL/AFL++.ATM...
In 30 seconds, this attack can learn which networks a MacOS computer has connected to before, and plant a script...
Wow, this past week has been a pretty long year for Zoom.As the COVID-19 global pandemic moved the whole knowledge-working...
At Rapid7, we have the opportunity to talk to security professionals from all types of organizations. Whether we’re conversing with...
A little more than one month after the European Union enacted the General Data Protection Regulation (GDPR) to extend new...
The coronavirus pandemic is forcing many people around the world to work remotely. This has significantly increased the popularity of...
In this particular scam, the recipients receive phishing emails asking them to donate money by filling forms for coronavirus or...
Recently, tens of YouTube accounts were hacked to broadcast a Ponzi cryptocurrency scheme by renaming the hacked YouTube accounts as...
FProbe - Fast HTTP ProbeInstallationGO111MODULE=on go get -u github.com/theblackturtle/fprobeFeaturesTake a list of domains/subdomains and probe for working http/https server.Optimize RAM...
SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing. Supports various...
If you’ve been in the security industry for any amount of time, you’re no stranger to false positives. They show...
With additional insights/analysis from Augusto Remillano II and Don Ovid Ladores Raccoon emerged as Malware as a Service (MaaS) last...
As more and more countries order their citizens inside in response to COVID-19, online shopping—already a widespread practice—has surged in...
According to the report by Rostelecom Solar JSOC, hackers changed the focus of attacks, switching from direct theft of money...