The Most Commonly Exploited Web Application Vulnerabilities in a Production Environment
Some of the most common web application vulnerabilities tend to be the most exploited because they are difficult to spot,...
Some of the most common web application vulnerabilities tend to be the most exploited because they are difficult to spot,...
This blog was originally published on November 13, 2019. By Feike Hacquebord, Cedric Pernet, and Kenney Lu The threat group...
iPhone users who visited certain publishing websites that were compromised by a malvertising campaign may have gotten an unwelcome visit...
A cybercriminal organization has been attacking Windows users with a hybrid ransomware and data stealer program that encrypts machines while...
In a lawsuit filed yesterday, Facebook is accusing a Hong Kong-based company of infecting individuals with malware in order to...
The U.S. today announced legal and regulatory action against the powerhouse cybercriminal group Evil Corp, filing hacking and bank fraud...
A new remote access trojan whose name reminds one of a fairytale and not the potential nightmare it could bring...
Ryuk. A name once unique to a fictional character in a popular Japanese comic book and cartoon series is now...
Monitoring possible threats of your company on Internet is an impossible task to be achieved manually. Hence many threats of...
hashcobra Hash Cracking tool.Usage$ ./hashcobra -H--====--usage: hashcobra -o <opr> | options: -a <alg> - hashing algorithm - ? to list...
The Attack Range solves two main challenges in development of detections. First, it allows the user to quickly build a...
By Arianne Dela Cruz, Jay Nebre and Augusto Remillano II As the value of cryptocurrencies increased (after a short dip...
By Vickie Su, Anita Hsieh, and Dove Chiu Waterbear, which has been around for several years, is a campaign that...
Microsoft released a total of 36 patches for December’s Patch Tuesday. Decembers tend to have a relatively low number of...
by William Gamazo Sanchez and Joseph C. Chen In November 2019, we published a blog analyzing an exploit kit we...
We found a new spyware family disguised as chat apps on a phishing website. We believe that the apps, which...
It’s no secret that as the security landscape becomes increasingly complex, resources are becoming harder and harder to find. Team...
Executive summary As part of a recent IoT hacking training exercise, a number of Rapid7 penetration testers set out to...
Today we come to the end of 2019's monthly Microsoft Patch Tuesday (also known as Update Tuesday). This Christmas, Microsoft...
What is a vulnerability risk management program? A vulnerability risk management program is imperative at any organization to secure assets,...
At Rapid7 Labs we are always on the look for new research topics and fields to stick our fingers in...
A fast web fuzzer written in Go.Heavily inspired by the great projects gobuster and wfuzz.FeaturesFast!Allows fuzzing of HTTP header values,...
This is a tool used to collect various intelligence sources for a given file. Fileintel is written in a modular...
Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with...