U.S. charges alleged members of “Evil Corp” cybercrime group for Zeus and Dridex campaigns
The U.S. today announced legal and regulatory action against the powerhouse cybercriminal group Evil Corp, filing hacking and bank fraud...
The U.S. today announced legal and regulatory action against the powerhouse cybercriminal group Evil Corp, filing hacking and bank fraud...
A new remote access trojan whose name reminds one of a fairytale and not the potential nightmare it could bring...
Ryuk. A name once unique to a fictional character in a popular Japanese comic book and cartoon series is now...
Monitoring possible threats of your company on Internet is an impossible task to be achieved manually. Hence many threats of...
hashcobra Hash Cracking tool.Usage$ ./hashcobra -H--====--usage: hashcobra -o <opr> | options: -a <alg> - hashing algorithm - ? to list...
The Attack Range solves two main challenges in development of detections. First, it allows the user to quickly build a...
By Arianne Dela Cruz, Jay Nebre and Augusto Remillano II As the value of cryptocurrencies increased (after a short dip...
By Vickie Su, Anita Hsieh, and Dove Chiu Waterbear, which has been around for several years, is a campaign that...
Microsoft released a total of 36 patches for December’s Patch Tuesday. Decembers tend to have a relatively low number of...
by William Gamazo Sanchez and Joseph C. Chen In November 2019, we published a blog analyzing an exploit kit we...
We found a new spyware family disguised as chat apps on a phishing website. We believe that the apps, which...
It’s no secret that as the security landscape becomes increasingly complex, resources are becoming harder and harder to find. Team...
Executive summary As part of a recent IoT hacking training exercise, a number of Rapid7 penetration testers set out to...
Today we come to the end of 2019's monthly Microsoft Patch Tuesday (also known as Update Tuesday). This Christmas, Microsoft...
What is a vulnerability risk management program? A vulnerability risk management program is imperative at any organization to secure assets,...
At Rapid7 Labs we are always on the look for new research topics and fields to stick our fingers in...
A fast web fuzzer written in Go.Heavily inspired by the great projects gobuster and wfuzz.FeaturesFast!Allows fuzzing of HTTP header values,...
This is a tool used to collect various intelligence sources for a given file. Fileintel is written in a modular...
Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with...
An antivirus maker discovered a bug in the decrypter application of the Ryuk Ransomware, the application "the Ryuk gang" basically...
A player of popular gaming title Elder Scrolls Online recently took to Reddit to warn users of a phish via...
Last week on Malwarebytes Labs, we took a look at a new version of the IcedID Trojan, described web skimmers...
Though Black Friday and Cyber Monday are over, the two shopping holidays were just precursors to the larger Christmas season—a...
There’s a well-worn saying in security: “If it’s too good to be true, then it probably isn’t.” This can easily...