Rapid7 Named a March 2020 Gartner Peer Insights Customers’ Choice for Vulnerability Assessment
The Rapid7 team is excited to announce that we have been recognized as a March 2020 Gartner Peer Insights Customers’...
The Rapid7 team is excited to announce that we have been recognized as a March 2020 Gartner Peer Insights Customers’...
By Elliot Cao, Joseph C. Chen, William Gamazo Sanchez, Lilang Wu, and Ecular Xu A recently discovered watering hole attack...
A version of this article originally appeared in Forbes on February 12, 2020. Consumerization: The specific impact that consumer-originated technologies...
Update: Following our blog post, we continued to monitor the Tupperware website. As of 03/25 at 1:45 PM PT, we...
More than 30 members of an interregional criminal group engaged in cloning and selling credit and payment cards of Russian...
According to data by Coindesk, the cryptocurrency value suddenly increased on Tuesday. And this comes as a matter of surprise...
Cybersecurity threats have seen a massive upsurge since the outbreak of the COVID-19 pandemic that forced a majority of people...
The coronavirus epidemic around the world has affected not only electronics factories, but many companies are also transferring their employees...
Katana-ds (ds for dork_scanner) is a simple python tool that automates Google Hacking/Dorking and support TorIt becomes more powerful in...
This tool is designed, developed and supported by evait security. In order to give something back to the security community,...
Two days ago marks my two years with Rapid7. It has been a fantastic adventure, and I’m quite excited to...
Businesses remain closed in many major cities around the world as the coronavirus pandemic rages, but cybercriminals are still open...
A coronavirus-themed phishing campaign designed to infect victims with Raccoon information-stealing malware has reportedly been leveraging an open redirect vulnerability...
End-of-life (EOL) is an expression commonly used by software vendors to indicate that a product or version of a product...
Amid the coronavirus epidemic and panic among the public, FTC (Federal Trade Commission) has urged the public to stay aware...
In August 2019, Kaspersky discovered a malicious campaign distributing a fully fledged C++ Trojan that we call Milum. All the...
Zphisher is an upgraded form of Shellphish. The main source code is from Shellphish . But I have not fully...
All in one tools for XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDERWritten by Hulya KarabagInstagram: Hulya KarabagScreenshotsHow to useRead MeThis...
Yesterday (March 23), Microsoft (https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200006) in a font rendering technology in many versions of Microsoft Windows with a warning that...
Cybersecurity has now become a feature of modernized US trade agreements, with new cybersecurity provisions in the US-Mexico-Canada Agreement and...
On this week’s episode of Security Nation, we had the pleasure of speaking with Alex Kreilein, CISO for RapidDeploy, a...
Introduction In March 2020, Google patched a critical vulnerability affecting many MediaTek based devices . This vulnerability had been known...
The FBI’s Internet Crime Complaint Center (IC3) has issued a public service announcement warning citizens to watch out for email-based...
Scammers and malware authors are taking advantage of the coronavirus crisis in full swing. We have seen a number of...