Financial and Customer Info being Exposed in Slickwraps Data Breach
Slickwraps, a mobile device case retailer that specializes in designing and assembling the most precision-fitted phone cases in the world...
Slickwraps, a mobile device case retailer that specializes in designing and assembling the most precision-fitted phone cases in the world...
Beware! People who have blind faith in the internet and tend to believe almost anything that they view or come...
DLLPasswordFilterImplant is a custom password filter DLL that allows the capture of a user's credentials. Each password change event on...
ohmybackup - Scan Victim's Backup Directories & Backup FilesohmybackupScans backup folders on target sites. Searches archived files in the folders...
The international community, following Georgia, the UK and the US, continues to publish statements condemning the cyberattack allegedly committed by...
This project inspects Java libraries and classpaths for gadget chains. Gadgets chains are used to construct exploits for deserialization vulnerabilities....
It's an information security audit tool that creates intelligent wordlists based on the content of the target page.Help usSee some...
The ticket reselling sites olympictickets2020.com and eurotickets2020.com reportedly have been compromised with Magecart POS skimming malware. Magecart was first spotted...
With the rise in the number of records ‘exposed’ by cloud misconfigurations year after year from 2018 to 2019 by...
Simple way to disable/rename buttons from a task manager.Installationgit clone https://github.com/Mrakovic-ORG/TaskManager-Button-Disablercd TaskManager-Button-DisablerTaskManager Button Disablerdotnet buildFeaturesRename kill proccess buttonDisable kill proccess...
Linux Privilege Escalation through SUDO abuse.If you like the tool and for my personal motivation so as to develop other...
We are thrilled to announce that global research and consulting firm Frost & Sullivan has named Rapid7 as the Global...
Despite their name, the RobbinHood cybercriminal gang is not stealing from the rich to give to the poor. Instead, these...
Joy all around for the social media fanatics who had gotten quite bored of WhatsApp being their only source of...
Since last year's summers, Chinese hackers have been targeting South Asian companies that own online gambling and betting websites. The...
A South Australian company, PSL Services, also known as Peregrine Corporation involved in the operation of service stations, convenience retail...
A new wave of cyberattacks targeting banks and energy companies has been recorded in Russia. Employees of these organizations receive...
Virus outbreaks are always gruesome: people, animals or computer systems get infected within a short time. Of course, viruses spreading...
AdamaSearches For Threat Hunting and Security AnalyticsA collection of known log and / or event data searches for threat hunting...
Intelligence Tool but without API keyWhat is Metabigor?Metabigor is Intelligence tool, its goal is to do OSINT tasks and more...
Rapid7 is thrilled to be recognized as a Leader in the 2020 Gartner Magic Quadrant for Security Information and Event...
When it comes to the data displayed in your security products, we understand that no two people want—or even need—the...
Former cybersecurity czar Rudy Giuliani has been targeted by typosquatters on Twitter, thanks to copious misspellings and other keyboarding errors...
Out of 8.4 million DDoS attacks recorded in 2019 alone, two-thirds of customer-facing enterprise systems bear the brunt of it...