Rapid7 Labs’ 2020 Naughty List Summary Report to Santa
As requested, your dutiful elves here at Rapid7 Labs have compiled a list of the naughty country networks being used...
As requested, your dutiful elves here at Rapid7 Labs have compiled a list of the naughty country networks being used...
Russian cryptocurrency exchange Livecoin was compromised on Christmas Eve, hackers breached its network and gained control of some of its...
Citrix confirmed that a DDoS attack is targeting Citrix Application Delivery Controller (ADC) networking equipment. The threat actors are using...
Millions of devices are potential exposed to attacks targeting the vulnerabilities exploited by the tools stolen from the arsenal of...
Hello Folks! In this Videobyte, we’re talking about what penetration testing tools malware gangs love to use and why they...
As the year is coming to a wrap, the 2020 holiday season is being actively attacked by malicious actors. In recent...
19 tech companies, cybersecurity firms, and non-profits have collaborated with the Institute for Security and Technology (IST) to form a...
An easy-to-use and lightweight API wrapper for the Censys Search Engine (censys.io). Python 3.6+ is currently supported.Getting StartedThe library can...
Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features.UsageHelp$ ./webserver -helpweb subcommand -bind...
Happy HaXmas! We hope everyone is having a wonderful holiday season so far. This year has been wild and unpredictable,...
Google’s Project Zero experts publicly disclosed details of an improperly patched zero-day code execution vulnerability in Windows. White hat hackers...
GRecon (Greei-Conn) is a simple python tool that automates the process of Google Based Recon AKA Google Dorking The current...
For this year's HaXmas, we're giving the gift of Metasploit knowledge! We'll cover a mix of old, new, or recently...
Convenience Comes at a Cost, But You Can Be Proactive Let’s face it, telling Alexa to take care of a...
“Throat kill! Throat kill!” “I need a dad.” These are just some of the things I heard a six-year-old boy...
As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available....
What happened SolarWinds, a well-known IT managed services provider, has recently become a victim of a cyberattack. Their product Orion...
Automated Web Assets Enumeration & Scanning Instructions for running Create an account on Zulip Navigate to Settings > Your Bots...
Israeli cyber security firm Cellebrite claims that it can decrypt messages from the popular Signal’s messaging app. Israeli security firm...
CyberNews Investigation team analyzed the 13 most popular messaging apps to see if the apps are really safe. Source: https://cybernews.com/security/research-nearly-all-of-your-messaging-apps-are-secure/...
Security experts shared lists of organizations that were infected with the SolarWinds Sunburst backdoor after decoding the DGA mechanism. Security...
Emotet is a threat we have been tracking very closely throughout the year thanks to its large email distribution campaigns....
We’re now into the most crucial stage of Christmas festivities, where money and gifts are on the march…and social media...
According to Positive Technologies, in 2020, cybercriminals have become increasingly interested in hacking sites: in seven out of ten cases,...